#VU90055 Use-after-free in Linux kernel


Published: 2024-05-30

Vulnerability identifier: #VU90055

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47541

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx4_en_try_alloc_resources() function in drivers/net/ethernet/mellanox/mlx4/en_netdev.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/be12572c5ddc8ad7453bada4eec8fa46967dc757
http://git.kernel.org/stable/c/676dc7d9b15bf8733233a2db1ec3f9091ab34275
http://git.kernel.org/stable/c/e461a9816a1ac5b4aeb61621b817225b61e46a68
http://git.kernel.org/stable/c/f1d43efa59f1edd3e7eca0e94559b4c6b1cd4e2b
http://git.kernel.org/stable/c/75917372eef0dbfb290ae45474314d35f97aea18
http://git.kernel.org/stable/c/addad7643142f500080417dd7272f49b7a185570


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability