CVE-2021-47247 — Use After Free in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 21
Latest updateMay 22
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock
removal from TC filter update path and properly handle concurrent encap
entry insertion/deletion which can lead to following use-after-free:
[23827.464923] ==================================================================
[23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
▶CVEListV5linux/linux2a1f1768fa17805ca2e937e2e034a7c3433d3bdc — 0d1e7a7964ce6abb28883a3906bbc20fe0009f03+3
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-2hh5-254v-jpf4: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
Function ml↗2024-05-21
OSV▶
CVE-2021-47247: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5↗2024-05-21
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2021-47247 kernel: net/mlx5e: Fix use-after-free of encap entry in neigh update handler↗2024-05-22