{"id":"CVE-2021-47439","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: microchip: Added the condition for scheduling ksz_mib_read_work\n\nWhen the ksz module is installed and removed using rmmod, kernel crashes\nwith null pointer dereferrence error. During rmmod, ksz_switch_remove\nfunction tries to cancel the mib_read_workqueue using\ncancel_delayed_work_sync routine and unregister switch from dsa.\n\nDuring dsa_unregister_switch it calls ksz_mac_link_down, which in turn\nreschedules the workqueue since mib_interval is non-zero.\nDue to which queue executed after mib_interval and it tries to access\ndp-\u003eslave. But the slave is unregistered in the ksz_switch_remove\nfunction. Hence kernel crashes.\n\nTo avoid this crash, before canceling the workqueue, resetted the\nmib_interval to 0.\n\nv1 -\u003e v2:\n-Removed the if condition in ksz_mib_read_work","modified":"2026-03-15T22:43:13.686606Z","published":"2024-05-22T07:15:09.163Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3"},{"type":"FIX","url":"https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.7"},{"fixed":"5.10.75"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.14"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc5"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47439.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}