CVE-2021-47439
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work<br />
<br />
When the ksz module is installed and removed using rmmod, kernel crashes<br />
with null pointer dereferrence error. During rmmod, ksz_switch_remove<br />
function tries to cancel the mib_read_workqueue using<br />
cancel_delayed_work_sync routine and unregister switch from dsa.<br />
<br />
During dsa_unregister_switch it calls ksz_mac_link_down, which in turn<br />
reschedules the workqueue since mib_interval is non-zero.<br />
Due to which queue executed after mib_interval and it tries to access<br />
dp->slave. But the slave is unregistered in the ksz_switch_remove<br />
function. Hence kernel crashes.<br />
<br />
To avoid this crash, before canceling the workqueue, resetted the<br />
mib_interval to 0.<br />
<br />
v1 -> v2:<br />
-Removed the if condition in ksz_mib_read_work
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
- https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
- https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3
- https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
- https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
- https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3



