#VU90251 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90251

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-46991

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the i40e_client_subtask() function in drivers/net/ethernet/intel/i40e/i40e_client.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
http://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
http://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
http://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
http://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
http://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability