#VU91305 Buffer overflow in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91305

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47485

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the qib_user_sdma_num_pages(), qib_user_sdma_free_pkt_frag(), qib_user_sdma_pin_pkt() and qib_user_sdma_queue_pkts() functions in drivers/infiniband/hw/qib/qib_user_sdma.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0
http://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad
http://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d
http://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42
http://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724
http://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780
http://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952
http://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability