.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
[
{
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"target": {
"function": "bcm_release",
"file": "net/can/bcm.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2021-3609-7661ae40",
"digest": {
"length": 1212.0,
"function_hash": "124180728460218492145646170244338934776"
},
"signature_type": "Function"
},
{
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"target": {
"function": "bcm_delete_rx_op",
"file": "net/can/bcm.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2021-3609-d77792e3",
"digest": {
"length": 675.0,
"function_hash": "165120736095818932897590320835605779393"
},
"signature_type": "Function"
},
{
"source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
"target": {
"file": "net/can/bcm.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2021-3609-d976d486",
"digest": {
"threshold": 0.9,
"line_hashes": [
"13665608197329077867374483219098165946",
"284968728569814436671196288202328141720",
"247286826847872670988649078003992922261",
"243484342043816250081782462999818378823",
"242283038446865004124882252294940719730",
"206693518736940388158162444555391734594",
"84634533362052775391598592882563384443",
"109732482988334288083668784146749646617",
"269610466909296698769114880708797448284"
]
},
"signature_type": "Line"
}
]