CVE-2021-47312
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: Fix dereference of null pointer flow<br />
<br />
In the case where chain->flags & NFT_CHAIN_HW_OFFLOAD is false then<br />
nft_flow_rule_create is not called and flow is NULL. The subsequent<br />
error handling execution via label err_destroy_flow_rule will lead<br />
to a null pointer dereference on flow when calling nft_flow_rule_destroy.<br />
Since the error path to err_destroy_flow_rule has to cater for null<br />
and non-null flows, only call nft_flow_rule_destroy if flow is non-null<br />
to fix this issue.<br />
<br />
Addresses-Coverity: ("Explicity null dereference")
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13.2 (including) | 5.13.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



