CVE-2021-47235
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/05/2024
Last modified:
30/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ethernet: fix potential use-after-free in ec_bhf_remove<br />
<br />
static void ec_bhf_remove(struct pci_dev *dev)<br />
{<br />
...<br />
struct ec_bhf_priv *priv = netdev_priv(net_dev);<br />
<br />
unregister_netdev(net_dev);<br />
free_netdev(net_dev);<br />
<br />
pci_iounmap(dev, priv->dma_io);<br />
pci_iounmap(dev, priv->io);<br />
...<br />
}<br />
<br />
priv is netdev private data, but it is used<br />
after free_netdev(). It can cause use-after-free when accessing priv<br />
pointer. So, fix it by moving free_netdev() after pci_iounmap()<br />
calls.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.15 (including) | 4.4.274 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.274 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.238 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.196 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.128 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.46 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.13 (excluding) |
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2
- https://git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84a
- https://git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6
- https://git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7ea
- https://git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6
- https://git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bb
- https://git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130
- https://git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8
- https://git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2
- https://git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84a
- https://git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6
- https://git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7ea
- https://git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6
- https://git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bb
- https://git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130
- https://git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8