First published: Wed Jul 28 2021(Updated: )
A flaw was found in the linux kernel, unix_gc() assumes that candidate sockets can never gain an external reference (i.e. be installed into an fd) while the unix_gc_lock is held. Except for MSG_PEEK this is guaranteed by modifying inflight count under the unix_gc_lock. References: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca</a>
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.47.1.el6 | 0:2.6.32-754.47.1.el6 |
redhat/kernel-rt | <0:3.10.0-1160.59.1.rt56.1200.el7 | 0:3.10.0-1160.59.1.rt56.1200.el7 |
redhat/kernel | <0:3.10.0-1160.59.1.el7 | 0:3.10.0-1160.59.1.el7 |
redhat/kernel | <0:3.10.0-514.99.1.el7 | 0:3.10.0-514.99.1.el7 |
redhat/kernel | <0:3.10.0-693.99.1.el7 | 0:3.10.0-693.99.1.el7 |
redhat/kernel | <0:3.10.0-957.92.1.el7 | 0:3.10.0-957.92.1.el7 |
redhat/kernel | <0:3.10.0-1062.66.1.el7 | 0:3.10.0-1062.66.1.el7 |
redhat/kernel-rt | <0:4.18.0-348.20.1.rt7.150.el8_5 | 0:4.18.0-348.20.1.rt7.150.el8_5 |
redhat/kernel | <0:4.18.0-348.20.1.el8_5 | 0:4.18.0-348.20.1.el8_5 |
redhat/kernel | <0:4.18.0-147.64.1.el8_1 | 0:4.18.0-147.64.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.75.1.rt13.125.el8_2 | 0:4.18.0-193.75.1.rt13.125.el8_2 |
redhat/kernel | <0:4.18.0-193.75.1.el8_2 | 0:4.18.0-193.75.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.40.1.rt7.112.el8_4 | 0:4.18.0-305.40.1.rt7.112.el8_4 |
redhat/kernel | <0:4.18.0-305.40.1.el8_4 | 0:4.18.0-305.40.1.el8_4 |
redhat/redhat-virtualization-host | <0:4.3.22-20220330.1.el7_9 | 0:4.3.22-20220330.1.el7_9 |
redhat/kernel | <5.14 | 5.14 |
Google Android Kernel | ||
Android | ||
Android | ||
Debian | =9.0 | |
IBM Security Guardium | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
IBM InfoSphere Guardium z/OS | <=11.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-0920 has a severity rating of medium, indicating it may allow a user to perform unauthorized operations in certain conditions.
To fix CVE-2021-0920, update the kernel to the specified remedial versions mentioned in the advisory.
CVE-2021-0920 affects various versions of the Linux kernel across different distributions such as Red Hat and Debian.
CVE-2021-0920 does not grant remote exploitation capabilities and requires local access to exploit.
CVE-2021-0920 becomes a risk when system configurations allow untrusted users local access to the system.