First published: Mon Mar 22 2021(Updated: )
In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux Kernel | <4.4.263 | |
Linux Kernel | >4.5<=4.9.263 | |
Linux Kernel | >=4.10<4.14.227 | |
Linux Kernel | >4.15<=4.19.183 | |
Linux Kernel | >=4.20<5.4.108 | |
Linux Kernel | >=5.5.0<5.10.26 | |
Linux Kernel | >=5.11<5.11.9 | |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 | |
netapp cloud backup | ||
NetApp FAS/AFF Baseboard Management Controller | ||
netapp solidfire baseboard management controller firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28972 has a high severity due to the user-tolerable buffer overflow vulnerability that poses significant risks to system security.
To fix CVE-2021-28972, you should upgrade your Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.10-1.
CVE-2021-28972 affects various versions of the Linux kernel up to 5.11.8, including specific Fedora and NetApp versions.
CVE-2021-28972 is classified as a buffer overflow vulnerability in the RPA PCI Hotplug driver.
Yes, CVE-2021-28972 can allow userspace to write data into the kernel stack frame, potentially leading to privilege escalation.