CVE-2021-43412
https://notcve.org/view.php?id=CVE-2021-43412
An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access. Se ha detectado un problema en GNU Hurd versiones anteriores a 0.9 20210404-9. libports acepta mensajes de notificación falsos de cualquier cliente en cualquier puerto, lo que puede conllevar a un uso de memoria previamente liberada del puerto. Esto puede ser explotado para la escalada de privilegios locales para conseguir acceso completo de root • https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html https://www.mail-archive.com/bug-hurd%40gnu.org/msg32116.html • CWE-416: Use After Free •
CVE-2021-43413
https://notcve.org/view.php?id=CVE-2021-43413
An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access. Se ha detectado un problema en GNU Hurd versiones anteriores a 0.9 20210404-9. Un único puerto de paginación es compartido entre todos los que mapean un archivo, permitiendo a cualquiera modificar cualquier archivo que pueda leer. • https://lists.gnu.org/archive/html/bug-hurd/2002-11/msg00263.html https://lists.gnu.org/archive/html/bug-hurd/2005-06/msg00191.html https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html https://www.mail-archive.com/bug-hurd%40gnu.org/msg32113.html •
CVE-2021-43414
https://notcve.org/view.php?id=CVE-2021-43414
An issue was discovered in GNU Hurd before 0.9 20210404-9. The use of an authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access. Se ha detectado un problema en GNU Hurd versiones anteriores a 0.9 20210404-9. El uso de un protocolo de autenticación en el servidor proc es vulnerable a unos ataques de tipo man-in-the-middle, que pueden ser explotados para la escalada de privilegios local para conseguir acceso completo a la root • https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html https://www.mail-archive.com/bug-hurd%40gnu.org/msg32114.html • CWE-287: Improper Authentication •
CVE-2021-43411
https://notcve.org/view.php?id=CVE-2021-43411
An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access. Se ha detectado un problema en GNU Hurd versiones anteriores a 0.9 20210404-9. Cuando se intenta ejecutar un ejecutable setuid, se presenta una ventana de tiempo cuando el proceso ya presenta los nuevos privilegios, pero todavía se refiere a la antigua tarea y es accesible mediante el antiguo puerto del proceso. • https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html https://salsa.debian.org/hurd-team/hurd/-/blob/4d1b079411e2f40576e7b58f9b5b78f733a2beda/debian/patches/0034-proc-Use-UIDs-for-evaluating-permissions.patch https://www.mail-archive.com/bug-hurd%40gnu.org/msg32112.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •