SB20240531435 - NULL pointer dereference in Linux kernel dsa microchip driver
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2021-47439)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL() function in drivers/net/dsa/microchip/ksz_common.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3
- https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
- https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.75
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.14
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15