7.8
CVSSv3

CVE-2021-23134

Published: 12/05/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use After Free vulnerability in nfc sockets in the Linux Kernel prior to 5.12.4 allows local malicious users to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
A flaw was found in the Linux kernel A use-after-free was found in the implementation of nfc sockets leading to a kernel privilege escalation from the context of an unprivileged user The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability ...
A use after free security issue has been found in the Linux kernel in llcp_sock_bind() and llcp_sock_connect() ...