CVE-2021-3609

Published on: Not Yet Published

Last Modified on: 06/18/2021 07:10:23 AM UTC

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Related QID Numbers

  • 159329 Oracle Enterprise Linux Security Update for kernel (ELSA-2021-3057)
  • 159380 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9442)
  • 159393 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9450)
  • 159394 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2021-9451)
  • 159399 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9452)
  • 159400 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2021-9453)
  • 178710 Debian Security Update for linux (DSA 4941-1)
  • 178712 Debian Security Update for linux (DLA 2713-1)
  • 178713 Debian Security Update for linux-4.19 (DLA 2714-1)
  • 178714 Debian Security Update for linux (DLA 2713-2)
  • 198416 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4997-1)
  • 198417 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4999-1)
  • 198418 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-5000-1)
  • 198419 Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-5001-1)
  • 198420 Ubuntu Security Notification for Linux kernel (HWE) vulnerability (USN-5002-1)
  • 198421 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-5003-1)
  • 198425 Ubuntu Security Notification for Linux kernel (KVM) vulnerabilities (USN-5000-2)
  • 198426 Ubuntu Security Notification for Linux kernel (KVM) vulnerabilities (USN-4997-2)
  • 198504 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5082-1)
  • 239541 Red Hat Update for kernel (RHSA-2021:3057)
  • 239542 Red Hat Update for kpatch-patch (RHSA-2021:3044)
  • 239543 Red Hat Update for kernel-rt (RHSA-2021:3088)
  • 239593 Red Hat Update for kpatch-patch (RHSA-2021:3380)
  • 239594 Red Hat Update for kernel-rt (RHSA-2021:3375)
  • 239599 Red Hat Update for kernel (RHSA-2021:3363)
  • 239614 Red Hat Update for kernel (RHSA-2021:3444)
  • 239616 Red Hat Update for kpatch-patch (RHSA-2021:3442)
  • 281692 Fedora Security Update for kernel (FEDORA-2021-fe826f202e)
  • 281693 Fedora Security Update for kernel (FEDORA-2021-95f2f1cfc7)
  • 352871 Amazon Linux Security Advisory for kernel : ALAS-2021-1539
  • 390219 Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2021-0030)
  • 670634 EulerOS Security Update for kernel (EulerOS-SA-2021-2392)
  • 670707 EulerOS Security Update for kernel (EulerOS-SA-2021-2465)
  • 670744 EulerOS Security Update for kernel (EulerOS-SA-2021-2502)
  • 670772 EulerOS Security Update for kernel (EulerOS-SA-2021-2530)
  • 671047 EulerOS Security Update for kernel (EulerOS-SA-2021-2588)
  • 750844 SUSE Enterprise Linux Security Update for kernel (SUSE-SU-2021:2407-1)
  • 750848 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2416-1)(Sequoia)
  • 750864 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2421-1)
  • 750868 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2427-1)
  • 750869 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2422-1)
  • 750877 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2427-1)
  • 750880 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2451-1)
  • 750887 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1076-1)
  • 750953 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2645-1)
  • 750963 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2687-1)
  • 751037 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (SUSE-SU-2021:2842-1)

Social Mentions

Source Title Posted (UTC)
Twitter Icon @oss_security CVE-2021-3609: Race condition in net/can/bcm.c leads to local privilege escalation: Posted by Norbert Slusarek on J… twitter.com/i/web/status/1… 2021-06-19 17:14:32
Twitter Icon @oss_security Re: CVE-2021-3609: Race condition in net/can/bcm.c leads to local privilege escalation: Posted by Thadeu Lima de So… twitter.com/i/web/status/1… 2021-06-19 23:16:04
Twitter Icon @Bobe_bot CVE-2021-3609: CAN BCM local privilege escalation (lobste.rs) github.com/nrb547/kernel-… 2021-06-20 02:00:03
Twitter Icon @lobsters CVE-2021-3609: CAN BCM local privilege escalation lobste.rs/s/xyqltt #linux #security github.com/nrb547/kernel-… 2021-06-20 03:25:12
Twitter Icon @Flugazi CVE-2021-3609: CAN BCM local privilege escalation ift.tt/3gH9I9e 2021-06-20 07:09:47
Twitter Icon @Securityblog kernel-exploitation/cve-2021-3609.md at main · nrb547/kernel-exploitation · GitHub github.com/nrb547/kernel-… 2021-06-20 08:00:42
Twitter Icon @d34dr4bbit kernel-exploitation/cve-2021-3609.md at main · nrb547/kernel-exploitation · GitHub aeternusmalus.wordpress.com/2021/06/20/ker… 2021-06-20 11:01:47
Twitter Icon @cyber_feminist kernel-exploitation/cve-2021-3609.md at main · nrb547/kernel-exploitation · GitHub github.com/nrb547/kernel-… GitHub… twitter.com/i/web/status/1… 2021-06-20 15:01:29
Twitter Icon @Securityblog kernel-exploitation/cve-2021-3609.md at main · nrb547/kernel-exploitation · GitHub github.com/nrb547/kernel-… 2021-06-21 18:47:40
Twitter Icon @omokazuki SIOSセキュリティブログを更新しました。 Linux Kernelの脆弱性(Important: CVE-2021-3609) #sios_tech #security #vulnerability #セキュリティ #脆弱性… twitter.com/i/web/status/1… 2021-06-21 21:23:55
Twitter Icon @softek_jp Linux Kernel の CAN BCM の処理に特権を奪われる問題 (CVE-2021-3609) [39330] sid.softek.jp/content/show/3… #SIDfm #脆弱性情報 2021-06-24 06:10:09
Twitter Icon @Har_sia CVE-2021-3609 har-sia.info/CVE-2021-3609.… #HarsiaInfo 2021-12-02 18:29:04
© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report