.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "4.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
}
]
}[
{
"events": [
{
"introduced": "2.6.25"
},
{
"fixed": "4.4.276"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.276"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.240"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.198"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.132"
}
]
},
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.10.50"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.12.17"
}
]
},
{
"events": [
{
"introduced": "5.13"
},
{
"fixed": "5.13.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
}
]
[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/can/bcm.c",
"function": "bcm_release"
},
"id": "CVE-2021-3609-7661ae40",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"digest": {
"function_hash": "124180728460218492145646170244338934776",
"length": 1212.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/can/bcm.c",
"function": "bcm_delete_rx_op"
},
"id": "CVE-2021-3609-d77792e3",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"digest": {
"function_hash": "165120736095818932897590320835605779393",
"length": 675.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/can/bcm.c"
},
"id": "CVE-2021-3609-d976d486",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"digest": {
"line_hashes": [
"13665608197329077867374483219098165946",
"284968728569814436671196288202328141720",
"247286826847872670988649078003992922261",
"243484342043816250081782462999818378823",
"242283038446865004124882252294940719730",
"206693518736940388158162444555391734594",
"84634533362052775391598592882563384443",
"109732482988334288083668784146749646617",
"269610466909296698769114880708797448284"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3609.json"