Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 May 2021 10:31:18 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Norbert Slusarek <nslusarek@....net>
Subject: Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation

On Fri, May 14, 2021 at 01:52:04AM +0200, Norbert Slusarek wrote:
> As Salvatore already mentioned, the assigned CVE ID is CVE-2021-32606.
> The exploitation details are published in an article available on github
> via this link:
> https://git.io/JsYYB

Thanks, Norbert!

I'm attaching files from the above link to this message for archival,
per this content guideline:

https://oss-security.openwall.org/wiki/mailing-lists/oss-security#list-content-guidelines

"At least the most essential part of your message (e.g., vulnerability
detail and/or exploit) should be directly included in the message itself
(and in plain text), rather than only included by reference to an
external resource.  Posting links to relevant external resources as well
is acceptable, but posting only links is not.  Your message should
remain valuable even with all of the external resources gone."

Alexander

View attachment "cve-2021-32606.md" of type "text/plain" (20004 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.