#VU91064 Use-after-free in Linux kernel


Published: 2024-06-04

Vulnerability identifier: #VU91064

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47162

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b
http://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c
http://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e
http://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf
http://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966
http://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c
http://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8
http://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability