#VU91306 Buffer overflow in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91306

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47458

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ocfs2_initialize_super() function in fs/ocfs2/super.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb
http://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e
http://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498
http://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1
http://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c
http://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad
http://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f
http://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability