U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47311 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: qcom/emac: fix UAF in emac_remove adpt is netdev private data and it cannot be used after free_netdev() call. Using adpt after free_netdev() can cause UAF bug. Fix it by moving free_netdev() at the end of the function.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7
https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7
https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c
https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c
https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81
https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81
https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839
https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839
https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4
https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4
https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d
https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d
https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833
https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47311
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org