Use-after-free in Linux kernel ethernet ti driver



Published: 2024-05-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-47310
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU90102

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47310

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tlan_remove_one() function in drivers/net/ethernet/ti/tlan.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf
http://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6
http://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9
http://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193
http://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1
http://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405
http://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342
http://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###