
Cloud Vulnerability DB
A community-led vulnerabilities database
In aiopollcomplete_work of aio.c, there is a possible memory corruption due to a use after free vulnerability in the Linux kernel. This vulnerability (CVE-2021-39698) was discovered in the Android kernel and could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (NVD).
The vulnerability exists in the poll implementation of the Linux kernel, specifically in the aiopollcomplete_work function of aio.c. It is classified as a use-after-free vulnerability that could result in memory corruption. The vulnerability has received a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access required with low attack complexity (NVD).
The vulnerability could allow a local attacker to cause a denial of service through system crash or potentially execute arbitrary code, leading to privilege escalation. No additional execution privileges are needed for exploitation, making it a significant security risk for affected systems (Ubuntu).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has provided fixes across various kernel versions, including linux-image-5.13.0-37-generic (5.13.0-37.42) for Ubuntu 21.10 and linux-image-5.4.0-100-generic (5.4.0-100.113) for Ubuntu 20.04 LTS. Users are advised to update their systems to the patched versions (USN).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."