Arch Linux Security Advisory ASA-202102-23 ========================================== Severity: Medium Date : 2021-02-12 CVE-ID : CVE-2021-3347 Package : linux Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1506 Summary ======= The package linux before version 5.10.12.arch1-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 5.10.12.arch1-1. # pacman -Syu "linux>=5.10.12.arch1-1" The problem has been fixed upstream in version 5.10.12.arch1. Workaround ========== None. Description =========== An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458. Impact ====== An attacker can escalate privileges on the system by abusing io_uring descriptor initialization. References ========== https://www.openwall.com/lists/oss-security/2021/01/29/1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i... https://security.archlinux.org/CVE-2021-3347