First published: Fri May 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() The free_rtllib() function frees the "dev" pointer so there is use after free on the next line. Re-arrange things to avoid that.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=3.2<4.4.294 | |
Linux kernel | >=4.5<4.9.292 | |
Linux kernel | >=4.10<4.14.257 | |
Linux kernel | >=4.15<4.19.219 | |
Linux kernel | >=4.20<5.4.163 | |
Linux kernel | >=5.5<5.10.83 | |
Linux kernel | >=5.11<5.15.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47571 has been classified as a moderate severity vulnerability due to the potential for use-after-free conditions.
To fix CVE-2021-47571, update your Linux Kernel to a version later than 4.4.294, 4.9.292, 4.14.257, 4.19.219, 5.4.163, 5.10.83, or 5.15.6.
CVE-2021-47571 affects Linux Kernel versions from 3.2 to 4.4.294, 4.5 to 4.9.292, 4.10 to 4.14.257, 4.15 to 4.19.219, 4.20 to 5.4.163, 5.5 to 5.10.83, and 5.11 to 5.15.6.
The implications of CVE-2021-47571 include potential crashes or arbitrary code execution due to a use-after-free vulnerability.
Yes, patches have been released that address CVE-2021-47571 in the affected versions of the Linux Kernel.