.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
[ { "deprecated": false, "digest": { "length": 1212.0, "function_hash": "124180728460218492145646170244338934776" }, "signature_type": "Function", "target": { "file": "net/can/bcm.c", "function": "bcm_release" }, "id": "CVE-2021-3609-7661ae40", "source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463", "signature_version": "v1" }, { "deprecated": false, "digest": { "length": 675.0, "function_hash": "165120736095818932897590320835605779393" }, "signature_type": "Function", "target": { "file": "net/can/bcm.c", "function": "bcm_delete_rx_op" }, "id": "CVE-2021-3609-d77792e3", "source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463", "signature_version": "v1" }, { "deprecated": false, "digest": { "line_hashes": [ "13665608197329077867374483219098165946", "284968728569814436671196288202328141720", "247286826847872670988649078003992922261", "243484342043816250081782462999818378823", "242283038446865004124882252294940719730", "206693518736940388158162444555391734594", "84634533362052775391598592882563384443", "109732482988334288083668784146749646617", "269610466909296698769114880708797448284" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "net/can/bcm.c" }, "id": "CVE-2021-3609-d976d486", "source": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463", "signature_version": "v1" } ]