
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-0342 is a vulnerability discovered in the Linux kernel's TUN/TAP device driver functionality, specifically in the tun_get_user function of tun.c. The vulnerability was disclosed on January 11, 2021, and affects various Linux-based systems including Android kernel and multiple Linux distributions. This use-after-free vulnerability could potentially lead to memory corruption (NVD, Ubuntu).
The vulnerability exists in the tun_get_user function of tun.c, where a use-after-free condition can lead to memory corruption. The vulnerability has been assigned a CVSS v3.1 base score of 6.7 (Medium), with the following characteristics: Attack Vector: Local, Attack Complexity: Low, Privileges Required: High, User Interaction: None, Scope: Unchanged, and Impact levels (Confidentiality, Integrity, Availability) all rated as High (Ubuntu).
The vulnerability can lead to local escalation of privilege with System execution privileges. The successful exploitation of this vulnerability could allow an attacker to gain elevated system privileges and potentially take control of the affected system (NVD).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has released fixes for various kernel versions including linux-aws (5.4.0-1022.22), linux-azure (5.4.0-1023.23), and linux-gcp (5.4.0-1022.22). The vulnerability was fixed in the Linux kernel through commit 96aa1b22bd6bb9fccf62f6261f390ed6f3e7967f (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."