We found results for “”
WS-2021-0537
Good to know:
Date: December 27, 2021
RDMA/irdma: Fix a user-after-free in add_pble_prm This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit 11eebcf63e98fcf047a876a51d76afdabc3b8b9b, it was introduced in version v5.14 by commit e8c4dbc2fcacf5a7468d312168bb120c27c38b32. For more details please see the references link.
Language: C
Severity Score
Severity Score
Weakness Type (CWE)
Use After Free
CWE-416Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |