Date: Fri, 14 May 2021 10:31:18 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: Norbert Slusarek <nslusarek@....net> Subject: Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation On Fri, May 14, 2021 at 01:52:04AM +0200, Norbert Slusarek wrote: > As Salvatore already mentioned, the assigned CVE ID is CVE-2021-32606. > The exploitation details are published in an article available on github > via this link: > https://git.io/JsYYB Thanks, Norbert! I'm attaching files from the above link to this message for archival, per this content guideline: https://oss-security.openwall.org/wiki/mailing-lists/oss-security#list-content-guidelines "At least the most essential part of your message (e.g., vulnerability detail and/or exploit) should be directly included in the message itself (and in plain text), rather than only included by reference to an external resource. Posting links to relevant external resources as well is acceptable, but posting only links is not. Your message should remain valuable even with all of the external resources gone." Alexander View attachment "cve-2021-32606.md" of type "text/plain" (20004 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.