CVE-2021-34981
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.
Vulnerabilidad de escalada de privilegios gratuita doble del módulo CMTP Bluetooth del kernel de Linux. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas del kernel de Linux. Un atacante primero debe obtener la capacidad de ejecutar código con altos privilegios en el sistema de destino para poder explotar esta vulnerabilidad. La falla específica existe dentro del módulo CMTP. El problema surge de la falta de validación de la existencia de un objeto antes de realizar más operaciones libres sobre el objeto. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar código en el contexto del kernel. Era ZDI-CAN-11977.
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-06-17 CVE Reserved
- 2021-10-21 CVE Published
- 2024-05-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-415: Double Free
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-1223 | X_research Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Kernel Search vendor "Linux" for product "Kernel" | * | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | * | - |
Affected
| ||||||
Huawei Search vendor "Huawei" | Euleros Search vendor "Huawei" for product "Euleros" | * | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | * | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | * | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Vm Server Search vendor "Oracle" for product "Vm Server" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Ses Search vendor "Suse" for product "Ses" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-ha Search vendor "Suse" for product "Sle-ha" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-hpc Search vendor "Suse" for product "Sle-hpc" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-live-patching Search vendor "Suse" for product "Sle-live-patching" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-basesystem Search vendor "Suse" for product "Sle-module-basesystem" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-development-tools Search vendor "Suse" for product "Sle-module-development-tools" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-legacy Search vendor "Suse" for product "Sle-module-legacy" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-live-patching Search vendor "Suse" for product "Sle-module-live-patching" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-public-cloud Search vendor "Suse" for product "Sle-module-public-cloud" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-module-rt Search vendor "Suse" for product "Sle-module-rt" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-sdk Search vendor "Suse" for product "Sle-sdk" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle-we Search vendor "Suse" for product "Sle-we" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc-espos Search vendor "Suse" for product "Sle Hpc-espos" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc-ltss Search vendor "Suse" for product "Sle Hpc-ltss" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Hpc Search vendor "Suse" for product "Sle Hpc" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sle Rt Search vendor "Suse" for product "Sle Rt" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sled Search vendor "Suse" for product "Sled" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles-bcl Search vendor "Suse" for product "Sles-bcl" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles-ltss Search vendor "Suse" for product "Sles-ltss" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles Search vendor "Suse" for product "Sles" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles Bcl Search vendor "Suse" for product "Sles Bcl" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Sles Sap Search vendor "Suse" for product "Sles Sap" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-linux-enterprise-rt Search vendor "Suse" for product "Suse-linux-enterprise-rt" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-manager-proxy Search vendor "Suse" for product "Suse-manager-proxy" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-manager-server Search vendor "Suse" for product "Suse-manager-server" | * | - |
Affected
| ||||||
Suse Search vendor "Suse" | Suse-microos Search vendor "Suse" for product "Suse-microos" | * | - |
Affected
|