
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel's IPv6 implementation, specifically in the ip6xmit function of ip6output.c, a use-after-free vulnerability was discovered. This vulnerability was assigned CVE-2021-0935 and was publicly disclosed on October 25, 2021. The issue affects Android kernel versions and various Linux-based systems (NVD).
The vulnerability is characterized by an out-of-bounds write condition due to a use-after-free scenario in the IPv6 implementation. It has been assigned a CVSS v3.1 base score of 6.7 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. The vulnerability is associated with two CWE categories: CWE-787 (Out-of-bounds Write) and CWE-416 (Use After Free) (NVD).
The exploitation of this vulnerability could lead to local privilege escalation with System execution privileges. The vulnerability could potentially allow an attacker to cause a denial of service (system crash) or possibly execute arbitrary code with elevated privileges (Ubuntu).
The vulnerability was addressed in the Android Security Bulletin of October 2021. Users and administrators are advised to apply the security updates provided by their respective vendors. For Ubuntu systems, security updates have been released to address this vulnerability (Android Security Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."