SB2021032005 - Privilege escalation in Linux kernel
Published: March 20, 2021 Updated: January 18, 2022
Security Bulletin ID
SB2021032005
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2021-28952)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the sound/soc/qcom/sdm845.c soundwire device driver in Linux kernel. A local user can run a specially crafted program to trigger a buffer overflow, when an unexpected port ID number is encountered, and execute arbitrary code on the system with elevated privileges.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31
- https://lore.kernel.org/alsa-devel/20210309142129.14182-2-srinivas.kandagatla@linaro.org/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
- https://security.netapp.com/advisory/ntap-20210430-0003/