Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-46991 |
CWE-ID | CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90251
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-46991
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the i40e_client_subtask() function in drivers/net/ethernet/intel/i40e/i40e_client.c. A local user can escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
http://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
http://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
http://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
http://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
http://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.