#VU91051 Use-after-free in Linux kernel - CVE-2021-47571
Published: June 4, 2024 / Updated: May 13, 2025
Vulnerability identifier: #VU91051
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-47571
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the _rtl92e_pci_disconnect() function in drivers/staging/rtl8192e/rtl8192e/rtl_core.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/d43aecb694b10db9a4228ce2d38b5ae8de374443
- https://git.kernel.org/stable/c/9186680382934b0e7529d3d70dcc0a21d087683b
- https://git.kernel.org/stable/c/c0ef0e75a858cbd8618b473f22fbca36106dcf82
- https://git.kernel.org/stable/c/bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13ef
- https://git.kernel.org/stable/c/2e1ec01af2c7139c6a600bbfaea1a018b35094b6
- https://git.kernel.org/stable/c/8d0163cec7de995f9eb9c3128c83fb84f0cb1c64
- https://git.kernel.org/stable/c/e27ee2f607fe6a9b923ef1fc65461c0613c97594
- https://git.kernel.org/stable/c/b535917c51acc97fb0761b1edec85f1f3d02bda4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.257
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.219
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.294
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.292
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.83
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.163