Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47310 |
CWE-ID | CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90102
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47310
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tlan_remove_one() function in drivers/net/ethernet/ti/tlan.c. A local user can escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf
http://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6
http://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9
http://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193
http://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1
http://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405
http://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342
http://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.