Unrated severityNVD Advisory· Published May 21, 2024· Updated May 4, 2025
net: ethernet: fix potential use-after-free in ec_bhf_remove
CVE-2021-47235
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: fix potential use-after-free in ec_bhf_remove
static void ec_bhf_remove(struct pci_dev *dev) { ... struct ec_bhf_priv *priv = netdev_priv(net_dev);
unregister_netdev(net_dev); free_netdev(net_dev);
pci_iounmap(dev, priv->dma_io); pci_iounmap(dev, priv->io); ... }
priv is netdev private data, but it is used after free_netdev(). It can cause use-after-free when accessing priv pointer. So, fix it by moving free_netdev() after pci_iounmap() calls.
Affected products
66- osv-coords65 versionspkg:rpm/suse/kernel-64kb&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_45&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-preempt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_57&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 5.3.18-150300.59.164.1+ 64 more
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 1-150300.7.3.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2mitre
- git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84amitre
- git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6mitre
- git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7eamitre
- git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6mitre
- git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bbmitre
- git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130mitre
- git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8mitre
News mentions
0No linked articles in our index yet.