An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2021-29265 - Medium Severity Vulnerability
Vulnerable Library - linux179e72b561d3d331c850e1a5779688d7a7de5246
Linux kernel stable tree mirror
Library home page: https://github.com/gregkh/linux.git
Found in HEAD commit: aae4c2fa46027fd4c477372871df090c6b94f3f1
Found in base branch: master
Vulnerable Source Files (2)
/drivers/usb/usbip/stub_dev.c /drivers/usb/usbip/stub_dev.c
Vulnerability Details
An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.
Publish Date: 2021-03-26
URL: CVE-2021-29265
CVSS 3 Score Details (4.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2021-29265
Release Date: 2021-03-26
Fix Resolution: v4.4.262, v4.9.262, v4.14.226, v4.19.181, v5.4.106, v5.10.24, v5.11.7, v5.12-rc3
Step up your Open Source Security Game with Mend here