U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-47439

Change History

New CVE Received from kernel.org 5/22/2024 3:15:09 AM

Action Type Old Value New Value
Added Description

								
							
							
						
In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work

When the ksz module is installed and removed using rmmod, kernel crashes
with null pointer dereferrence error. During rmmod, ksz_switch_remove
function tries to cancel the mib_read_workqueue using
cancel_delayed_work_sync routine and unregister switch from dsa.

During dsa_unregister_switch it calls ksz_mac_link_down, which in turn
reschedules the workqueue since mib_interval is non-zero.
Due to which queue executed after mib_interval and it tries to access
dp->slave. But the slave is unregistered in the ksz_switch_remove
function. Hence kernel crashes.

To avoid this crash, before canceling the workqueue, resetted the
mib_interval to 0.

v1 -> v2:
-Removed the if condition in ksz_mib_read_work
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3 [No types assigned]