SB2024051341 - Privilege escalation in Linux kernel tun
Published: May 13, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Double Free (CVE-ID: CVE-2021-47082)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in drivers/net/tun.c. A local user can trigger a double free error and execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
- https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
- https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
- https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
- https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.280
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.136
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.240