CVE-2021-29265
Summary
| CVE | CVE-2021-29265 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-26 22:15:00 UTC |
| Updated | 2022-05-27 16:47:00 UTC |
| Description | An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 |
MISC |
cdn.kernel.org |
|
| [SECURITY] [DLA 2689-1] linux security update |
MLIST |
lists.debian.org |
|
| kernel/git/stable/linux.git - Linux kernel stable tree |
MISC |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174896 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1177-1)
- 174897 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1175-1)
- 174916 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1210-1)
- 174917 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1211-1)
- 174919 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1238-1)
- 178680 Debian Security Update for linux (DLA 2689-1)
- 180488 Debian Security Update for linux (CVE-2021-29265)
- 198363 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4945-1)
- 198366 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4949-1)
- 198371 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4946-1)
- 198377 Ubuntu Security Notification for Linux kernel (Raspberry Pi) vulnerabilities (USN-4945-2)
- 352274 Amazon Linux Security Advisory for kernel: ALAS2-2021-1627
- 670416 EulerOS Security Update for kernel (EulerOS-SA-2021-1983)
- 670438 EulerOS Security Update for kernel (EulerOS-SA-2021-2062)
- 670463 EulerOS Security Update for kernel (EulerOS-SA-2021-2221)
- 670634 EulerOS Security Update for kernel (EulerOS-SA-2021-2392)
- 671047 EulerOS Security Update for kernel (EulerOS-SA-2021-2588)
- 671448 EulerOS Security Update for kernel (EulerOS-SA-2022-1450)
- 750004 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1573-1)
- 750006 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1596-1)
- 750014 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1623-1)
- 750015 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1624-1)
- 750199 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0758-1)
- 750276 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0532-1)
- 750650 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1975-1)
- 750652 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1977-1)
- 750762 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1977-1)
- 750766 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1975-1)
- 900100 CBL-Mariner Linux Security Update for kernel 5.10.52.1
- 900305 CBL-Mariner Linux Security Update for kernel 5.10.57.1
- 900320 CBL-Mariner Linux Security Update for kernel 5.10.60.1
- 901859 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6547-1)
- 903397 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4026)
- 906156 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4026-1)