First published: Thu Dec 09 2021(Updated: )
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel | <5.16 | 5.16 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux Kernel | <=5.15.11 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =35 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp baseboard management controller h410c firmware | ||
netapp baseboard management controller h410c | ||
NetApp Baseboard Management Controller Firmware | ||
netapp baseboard management controller h300s | ||
NetApp Baseboard Management Controller Firmware | ||
netapp baseboard management controller h500s | ||
NetApp Baseboard Management Controller Firmware | ||
netapp baseboard management controller h700s | ||
NetApp Baseboard Management Controller Firmware | ||
netapp baseboard management controller h300e | ||
netapp baseboard management controller h500e firmware | ||
netapp baseboard management controller h500e | ||
netapp baseboard management controller h700e firmware | ||
netapp baseboard management controller h700e | ||
NetApp Baseboard Management Controller Firmware | ||
netapp baseboard management controller h410s |
To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44733 has been rated as having a high severity due to its potential to allow arbitrary code execution in the Linux kernel.
To fix CVE-2021-44733, upgrade to the kernel versions 0:4.18.0-372.9.1.rt7.166.el8, 0:4.18.0-372.9.1.el8, or any version starting from 5.16.
CVE-2021-44733 affects various Linux distributions including Red Hat Enterprise Linux 8.0, Fedora 35, and Debian versions 9.0, 10.0, and 11.0.
A use-after-free vulnerability occurs when memory is freed but still accessible, allowing malicious exploitation and potential system compromise.
There are no specific mitigations for CVE-2021-44733; the recommended action is to apply the provided patches as soon as possible.