Lucene search

K
redhatcveRedhat.comRH:CVE-2021-47235
HistoryMay 23, 2024 - 2:01 p.m.

CVE-2021-47235

2024-05-2314:01:38
redhat.com
access.redhat.com
6
linux kernel
cve-2021-47235
use-after-free
ethernet
net
pci_iounmap
priv pointer
mitigation

AI Score

9

Confidence

High

EPSS

0

Percentile

13.0%

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: fix potential use-after-free in ec_bhf_remove static void ec_bhf_remove(struct pci_dev *dev) { … struct ec_bhf_priv *priv = netdev_priv(net_dev); unregister_netdev(net_dev); free_netdev(net_dev); pci_iounmap(dev, priv->dma_io); pci_iounmap(dev, priv->io); … } priv is netdev private data, but it is used after free_netdev(). It can cause use-after-free when accessing priv pointer. So, fix it by moving free_netdev() after pci_iounmap() calls.

Mitigation

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

AI Score

9

Confidence

High

EPSS

0

Percentile

13.0%