{"containers":{"cna":{"affected":[{"product":"Linux kernel","vendor":"Ubuntu","versions":[{"lessThan":"5.8.0-50.56","status":"affected","version":"5.8 kernel","versionType":"custom"},{"lessThan":"5.4.0-72.80","status":"affected","version":"5.4 kernel","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Vincent Dehors of Synactiv Digital Security"}],"datePublic":"2021-04-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-415","description":"CWE-415: Double Free","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-401","description":"CWE-401: Missing Release of Memory after Effective Lifetime","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-05-18T17:06:14.000Z","orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.openwall.com/lists/oss-security/2021/04/16/2"},{"tags":["x_refsource_MISC"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=8fee52ab9da87d82bc6de9ebb3480fff9b4d53e6"},{"tags":["x_refsource_MISC"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=25c891a949bf918b59cbc6e4932015ba4c35c333"},{"tags":["x_refsource_MISC"],"url":"https://ubuntu.com/security/notices/USN-4917-1"},{"tags":["x_refsource_MISC"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-422/"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html"}],"source":{"discovery":"EXTERNAL"},"title":"Ubuntu linux kernel shiftfs file system double free vulnerability","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@ubuntu.com","DATE_PUBLIC":"2021-04-15T00:00:00.000Z","ID":"CVE-2021-3492","STATE":"PUBLIC","TITLE":"Ubuntu linux kernel shiftfs file system double free vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Linux kernel","version":{"version_data":[{"version_affected":"<","version_name":"5.8 kernel","version_value":"5.8.0-50.56"},{"version_affected":"<","version_name":"5.4 kernel","version_value":"5.4.0-72.80"}]}}]},"vendor_name":"Ubuntu"}]}},"credit":[{"lang":"eng","value":"Vincent Dehors of Synactiv Digital Security"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-415: Double Free"}]},{"description":[{"lang":"eng","value":"CWE-401: Missing Release of Memory after Effective Lifetime"}]}]},"references":{"reference_data":[{"name":"https://www.openwall.com/lists/oss-security/2021/04/16/2","refsource":"MISC","url":"https://www.openwall.com/lists/oss-security/2021/04/16/2"},{"name":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=8fee52ab9da87d82bc6de9ebb3480fff9b4d53e6","refsource":"MISC","url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=8fee52ab9da87d82bc6de9ebb3480fff9b4d53e6"},{"name":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=25c891a949bf918b59cbc6e4932015ba4c35c333","refsource":"MISC","url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=25c891a949bf918b59cbc6e4932015ba4c35c333"},{"name":"https://ubuntu.com/security/notices/USN-4917-1","refsource":"MISC","url":"https://ubuntu.com/security/notices/USN-4917-1"},{"name":"https://www.zerodayinitiative.com/advisories/ZDI-21-422/","refsource":"MISC","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-422/"},{"name":"http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T16:53:17.692Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.openwall.com/lists/oss-security/2021/04/16/2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=8fee52ab9da87d82bc6de9ebb3480fff9b4d53e6"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=25c891a949bf918b59cbc6e4932015ba4c35c333"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-4917-1"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-422/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/162614/Kernel-Live-Patch-Security-Notice-LSN-0077-1.html"}]}]},"cveMetadata":{"assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","assignerShortName":"canonical","cveId":"CVE-2021-3492","datePublished":"2021-04-17T04:20:16.011Z","dateReserved":"2021-04-09T00:00:00.000Z","dateUpdated":"2024-09-17T03:54:52.527Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}