First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: fix potential use-after-free in ec_bhf_remove static void ec_bhf_remove(struct pci_dev *dev) { ... struct ec_bhf_priv *priv = netdev_priv(net_dev); unregister_netdev(net_dev); free_netdev(net_dev); pci_iounmap(dev, priv->dma_io); pci_iounmap(dev, priv->io); ... } priv is netdev private data, but it is used after free_netdev(). It can cause use-after-free when accessing priv pointer. So, fix it by moving free_netdev() after pci_iounmap() calls.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.15<4.4.274 | |
Linux Linux kernel | >=4.5<4.9.274 | |
Linux Linux kernel | >=4.10<4.14.238 | |
Linux Linux kernel | >=4.15<4.19.196 | |
Linux Linux kernel | >=4.20<5.4.128 | |
Linux Linux kernel | >=5.5<5.10.46 | |
Linux Linux kernel | >=5.11<5.12.13 | |
Linux Linux kernel | =5.13-rc1 | |
Linux Linux kernel | =5.13-rc2 | |
Linux Linux kernel | =5.13-rc3 | |
Linux Linux kernel | =5.13-rc4 | |
Linux Linux kernel | =5.13-rc5 | |
Linux Linux kernel | =5.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.