CVE-2021-23134 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV3.5
EPSS
0.0%
top 94.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 12
Latest updateMar 1
Description
Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages7 packages
▶CVEListV5linux/linuxa1cdd18c49d23ec38097ac2c5b0d761146fc0109 — 26157c82ba756767b2bd66d28a71b1bc454447f6+9
Also affects: Debian Linux 9.0, Fedora 33, 34
Patches
🔴Vulnerability Details
12GHSA▶
GHSA-47q3-98v3-643r: In the Linux kernel, the following vulnerability has been resolved:
net/nfc: fix use-after-free llcp_sock_bind/connect
Commits 8a4cd82d ("nfc: fix r↗2024-03-01
OSV▶
CVE-2021-47068: In the Linux kernel, the following vulnerability has been resolved: net/nfc: fix use-after-free llcp_sock_bind/connect Commits 8a4cd82d ("nfc: fix ref↗2024-02-29
GHSA▶
GHSA-jm36-c9r2-g7rq: Use After Free vulnerability in nfc sockets in the Linux Kernel before 5↗2022-05-24