SB2021122819 - Privilege escalation in Linux kernel TEE subsystem



SB2021122819 - Privilege escalation in Linux kernel TEE subsystem

Published: December 28, 2021

Security Bulletin ID SB2021122819
Severity
Low
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2021-44733)

The vulnerability allows a local user to elevate privileges on the system.

The vulnerability exists due to a use-after-free error in the drivers/tee/tee_shm.c file within the TEE subsystem in the Linux kernel. A local user can trigger a race condition in tee_shm_get_from_id during an attempt to free a shared memory object and execute arbitrary code with elevated privileges.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.