#VU91070 Use-after-free in Linux kernel


Published: 2024-06-04

Vulnerability identifier: #VU91070

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-46998

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the enic_queue_wq_skb_encap(), enic_queue_wq_skb() and enic_hard_start_xmit() functions in drivers/net/ethernet/cisco/enic/enic_main.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976
http://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3
http://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1
http://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3
http://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24
http://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability