{"id":"CVE-2021-47486","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Fix potential NULL dereference\n\nThe bpf_jit_binary_free() function requires a non-NULL argument. When\nthe RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,\njit_data-\u003eheader will be NULL, which triggers a NULL\ndereference. Avoid this by checking the argument, prior calling the\nfunction.","modified":"2026-03-14T11:19:12.048100Z","published":"2024-05-22T09:15:10.573Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47486.json","unresolved_ranges":[{"events":[{"introduced":"5.7"},{"fixed":"5.10.77"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.16"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}