#VU91064 Use-after-free in Linux kernel - CVE-2021-47162


Vulnerability identifier: #VU91064

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47162

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b
https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c
https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e
https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf
https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966
https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c
https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8
https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability