CVE-2021-47239
net: usb: fix possible use-after-free in smsc75xx_bind
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: net: usb: fix possible use-after-free in smsc75xx_bind The commit 46a8b29c6306 ("net: usb: fix memory leak in smsc75xx_bind")
fails to clean up the work scheduled in smsc75xx_reset->
smsc75xx_set_multicast, which leads to use-after-free if the work is
scheduled to start after the deallocation. In addition, this patch
also removes a dangling pointer - dev->data[0]. This patch calls cancel_work_sync to cancel the scheduled work and set
the dangling pointer to NULL.
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net:usb: corrige posible use after free en smsc75xx_bind. La confirmación 46a8b29c6306 ("net:usb: corrige la pérdida de memoria en smsc75xx_bind") no logra limpiar el trabajo programado en smsc75xx_reset -> smsc75xx_set_multicast, lo que genera use after free si el trabajo está programado para comenzar después de la desasignación. Además, este parche también elimina un puntero colgante: dev->data[0]. Este parche llama a cancel_work_sync para cancelar el trabajo programado y establecer el puntero colgante en NULL.
In the Linux kernel, the following vulnerability has been resolved: net: usb: fix possible use-after-free in smsc75xx_bind The commit 46a8b29c6306 ("net: usb: fix memory leak in smsc75xx_bind") fails to clean up the work scheduled in smsc75xx_reset-> smsc75xx_set_multicast, which leads to use-after-free if the work is scheduled to start after the deallocation. In addition, this patch also removes a dangling pointer - dev->data[0]. This patch calls cancel_work_sync to cancel the scheduled work and set the dangling pointer to NULL.
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bug fixes.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-10 CVE Reserved
- 2024-05-21 CVE Published
- 2025-05-04 CVE Updated
- 2025-06-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa | Vuln. Introduced | |
https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f | Vuln. Introduced | |
https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc | Vuln. Introduced | |
https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07 | Vuln. Introduced | |
https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17 | Vuln. Introduced | |
https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0 | Vuln. Introduced | |
https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.4.271 < 4.4.274 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.4.271 < 4.4.274" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.9.271 < 4.9.274 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.9.271 < 4.9.274" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.14.235 < 4.14.238 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.14.235 < 4.14.238" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.19.193 < 4.19.196 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.19.193 < 4.19.196" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.4.124 < 5.4.128 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.4.124 < 5.4.128" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.10.42 < 5.10.46 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.10.42 < 5.10.46" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.12.9 < 5.12.13 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.12.9 < 5.12.13" | en |
Affected
|