#VU90133 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90133

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47355

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nicstar_cleanup() function in drivers/atm/nicstar.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/99779c9d9ffc7775da6f7fd8a7c93ac61657bed5
http://git.kernel.org/stable/c/4e2a0848ea2cab0716d46f85a8ccd5fa9a493e51
http://git.kernel.org/stable/c/c471569632654e57c83512e0fc1ba0dbb4544ad6
http://git.kernel.org/stable/c/a7a7b2848312cc4c3a42b6e42a8ab2e441857aba
http://git.kernel.org/stable/c/bdf5334250c69fabf555b7322c75249ea7d5f148
http://git.kernel.org/stable/c/a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785
http://git.kernel.org/stable/c/2f958b6f6ba0854b39be748d21dfe71e0fe6580f
http://git.kernel.org/stable/c/5b991df8881088448cb223e769e37cab8dd40706
http://git.kernel.org/stable/c/34e7434ba4e97f4b85c1423a59b2922ba7dff2ea


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability