Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() The free_rtllib() function frees the "dev" pointer so there is use after free on the next line. Re-arrange things to avoid that.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.2, < 4.4.294 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2e1ec01af2c7139c6a600bbfaea1a018b35094b6Patch
- https://git.kernel.org/stable/c/8d0163cec7de995f9eb9c3128c83fb84f0cb1c64Patch
- https://git.kernel.org/stable/c/9186680382934b0e7529d3d70dcc0a21d087683bPatch
- https://git.kernel.org/stable/c/b535917c51acc97fb0761b1edec85f1f3d02bda4Patch
- https://git.kernel.org/stable/c/bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13efPatch
- https://git.kernel.org/stable/c/c0ef0e75a858cbd8618b473f22fbca36106dcf82Patch
- https://git.kernel.org/stable/c/d43aecb694b10db9a4228ce2d38b5ae8de374443Patch
- https://git.kernel.org/stable/c/e27ee2f607fe6a9b923ef1fc65461c0613c97594Patch
- https://git.kernel.org/stable/c/2e1ec01af2c7139c6a600bbfaea1a018b35094b6Patch
- https://git.kernel.org/stable/c/8d0163cec7de995f9eb9c3128c83fb84f0cb1c64Patch
- https://git.kernel.org/stable/c/9186680382934b0e7529d3d70dcc0a21d087683bPatch
- https://git.kernel.org/stable/c/b535917c51acc97fb0761b1edec85f1f3d02bda4Patch
- https://git.kernel.org/stable/c/bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13efPatch
- https://git.kernel.org/stable/c/c0ef0e75a858cbd8618b473f22fbca36106dcf82Patch
- https://git.kernel.org/stable/c/d43aecb694b10db9a4228ce2d38b5ae8de374443Patch
FAQ
What is CVE-2021-47571?
CVE-2021-47571 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() The free_rtllib() function frees the "dev" pointer so there is u...
How severe is CVE-2021-47571?
CVE-2021-47571 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47571?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.