CVE-2021-47564

In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix double free issue on err path fix error path handling in prestera_bridge_port_join() that cases prestera driver to crash (see below). Trace: Internal error: Oops: 96000044 [#1] SMP Modules linked in: prestera_pci prestera uio_pdrv_genirq CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : prestera_bridge_destroy+0x2c/0xb0 [prestera] lr : prestera_bridge_port_join+0x2cc/0x350 [prestera] sp : ffff800011a1b0f0 ... x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122 Call trace: prestera_bridge_destroy+0x2c/0xb0 [prestera] prestera_bridge_port_join+0x2cc/0x350 [prestera] prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera] prestera_netdev_event_handler+0xf4/0x110 [prestera] raw_notifier_call_chain+0x54/0x80 call_netdevice_notifiers_info+0x54/0xa0 __netdev_upper_dev_link+0x19c/0x380
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*

History

06 Jan 2025, 20:52

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253 - () https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253 - Patch
References () https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e - () https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e - Patch
References () https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd - () https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-415

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253 - () https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253 -
References () https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e - () https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e -
References () https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd - () https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net: marvell: prestera: corrige el problema de doble liberación en la ruta de error corrige el manejo de la ruta de error en prestera_bridge_port_join() que hace que el controlador de prestera falle (ver más abajo). Seguimiento: Error interno: Ups: 96000044 [#1] Módulos SMP vinculados en: prestera_pci prestera uio_pdrv_genirq CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: prestera_bridge_destroy+0x2c/0xb0 [prestera] lr: prestera_bridge_port_join+0x2cc/0x350 [prestera] sp: ffff800011a1b0f0... x2: ffff000109ca6c80 x1: dead000000000100 x0: dead00000 0000122 Rastreo de llamadas: prestera_bridge_destroy+0x2c/0xb0 [prestera] prestera_bridge_port_join+0x2cc/0x350 [prestera] prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera] prestera_netdev_event_handler+0xf4/0x110 [prestera] raw_notifier_call_chain+0x54/0x80 call_netdevice_notifiers_info+0 x54/0xa0 __netdev_upper_dev_link+0x19c/0x380

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-01-06 20:52


NVD link : CVE-2021-47564

Mitre link : CVE-2021-47564

CVE.ORG link : CVE-2021-47564


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free