Use-after-free in Linux kernel atm driver



Published: 2024-05-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-47355
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU90133

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47355

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nicstar_cleanup() function in drivers/atm/nicstar.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/99779c9d9ffc7775da6f7fd8a7c93ac61657bed5
http://git.kernel.org/stable/c/4e2a0848ea2cab0716d46f85a8ccd5fa9a493e51
http://git.kernel.org/stable/c/c471569632654e57c83512e0fc1ba0dbb4544ad6
http://git.kernel.org/stable/c/a7a7b2848312cc4c3a42b6e42a8ab2e441857aba
http://git.kernel.org/stable/c/bdf5334250c69fabf555b7322c75249ea7d5f148
http://git.kernel.org/stable/c/a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785
http://git.kernel.org/stable/c/2f958b6f6ba0854b39be748d21dfe71e0fe6580f
http://git.kernel.org/stable/c/5b991df8881088448cb223e769e37cab8dd40706
http://git.kernel.org/stable/c/34e7434ba4e97f4b85c1423a59b2922ba7dff2ea


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###