#VU90102 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90102

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47310

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tlan_remove_one() function in drivers/net/ethernet/ti/tlan.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf
http://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6
http://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9
http://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193
http://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1
http://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405
http://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342
http://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability