SB20250226313 - Use-after-free in Linux kernel powerpc mm
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2021-47632)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pte_update_delta() and change_page_attr() functions in arch/powerpc/mm/pageattr.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/6def4eaf0391f24be541633a954c0e4876858b1e
- https://git.kernel.org/stable/c/6ebe5ca2cbe438a688f2ae238ef5a0b0b5f3468a
- https://git.kernel.org/stable/c/96917107e67846f1d959ed03be281048efad14c5
- https://git.kernel.org/stable/c/a4c182ecf33584b9b2d1aa9dad073014a504c01f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.34
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.20
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18