CVE-2021-47247Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateMay 22

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path and properly handle concurrent encap entry insertion/deletion which can lead to following use-after-free: [23827.464923] ================================================================== [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.115.12.13+2
Debianlinux/linux_kernel< 5.10.237-1+3
CVEListV5linux/linux2a1f1768fa17805ca2e937e2e034a7c3433d3bdc0d1e7a7964ce6abb28883a3906bbc20fe0009f03+3
debiandebian/linux< linux 5.14.6-1 (bookworm)

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2hh5-254v-jpf4: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function ml2024-05-21
OSV
CVE-2021-47247: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx52024-05-21

📋Vendor Advisories

2
Red Hat
kernel: net/mlx5e: Fix use-after-free of encap entry in neigh update handler2024-05-21
Debian
CVE-2021-47247: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ...2021

💬Community

1
Bugzilla
CVE-2021-47247 kernel: net/mlx5e: Fix use-after-free of encap entry in neigh update handler2024-05-22