#VU90920 Double free in Linux kernel


Vulnerability identifier: #VU90920

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47483

CWE-ID: CWE-415

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the regcache_rbtree_insert_to_block() function in drivers/base/regmap/regcache-rbtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
http://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
http://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
http://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
http://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
http://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
http://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
http://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability