Unrated severityNVD Advisory· Published May 21, 2024· Updated May 4, 2025
net: ti: fix UAF in tlan_remove_one
CVE-2021-47310
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ti: fix UAF in tlan_remove_one
priv is netdev private data and it cannot be used after free_netdev() call. Using priv after free_netdev() can cause UAF bug. Fix it by moving free_netdev() at the end of the function.
Affected products
60- osv-coords59 versionspkg:rpm/almalinux/bpftoolpkg:rpm/almalinux/kernelpkg:rpm/almalinux/kernel-abi-stablelistspkg:rpm/almalinux/kernel-corepkg:rpm/almalinux/kernel-cross-headerspkg:rpm/almalinux/kernel-debugpkg:rpm/almalinux/kernel-debug-corepkg:rpm/almalinux/kernel-debug-develpkg:rpm/almalinux/kernel-debug-modulespkg:rpm/almalinux/kernel-debug-modules-extrapkg:rpm/almalinux/kernel-develpkg:rpm/almalinux/kernel-docpkg:rpm/almalinux/kernel-headerspkg:rpm/almalinux/kernel-modulespkg:rpm/almalinux/kernel-modules-extrapkg:rpm/almalinux/kernel-rtpkg:rpm/almalinux/kernel-rt-corepkg:rpm/almalinux/kernel-rt-debugpkg:rpm/almalinux/kernel-rt-debug-corepkg:rpm/almalinux/kernel-rt-debug-develpkg:rpm/almalinux/kernel-rt-debug-kvmpkg:rpm/almalinux/kernel-rt-debug-modulespkg:rpm/almalinux/kernel-rt-debug-modules-extrapkg:rpm/almalinux/kernel-rt-develpkg:rpm/almalinux/kernel-rt-kvmpkg:rpm/almalinux/kernel-rt-modulespkg:rpm/almalinux/kernel-rt-modules-extrapkg:rpm/almalinux/kernel-toolspkg:rpm/almalinux/kernel-tools-libspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/almalinux/kernel-zfcpdumppkg:rpm/almalinux/kernel-zfcpdump-corepkg:rpm/almalinux/kernel-zfcpdump-develpkg:rpm/almalinux/kernel-zfcpdump-modulespkg:rpm/almalinux/kernel-zfcpdump-modules-extrapkg:rpm/almalinux/perfpkg:rpm/almalinux/python3-perfpkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_57&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.18.0-553.8.1.el8_10+ 58 more
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70mitre
- git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9mitre
- git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342mitre
- git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193mitre
- git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bfmitre
- git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1mitre
- git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6mitre
- git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405mitre
News mentions
0No linked articles in our index yet.