CVE-2021-47486
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/05/2024
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv, bpf: Fix potential NULL dereference<br />
<br />
The bpf_jit_binary_free() function requires a non-NULL argument. When<br />
the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,<br />
jit_data->header will be NULL, which triggers a NULL<br />
dereference. Avoid this by checking the argument, prior calling the<br />
function.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b
- https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d
- https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41
- https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b
- https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d
- https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41



