{"id":"CVE-2021-47564","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: fix double free issue on err path\n\nfix error path handling in prestera_bridge_port_join() that\ncases prestera driver to crash (see below).\n\n Trace:\n   Internal error: Oops: 96000044 [#1] SMP\n   Modules linked in: prestera_pci prestera uio_pdrv_genirq\n   CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1\n   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : prestera_bridge_destroy+0x2c/0xb0 [prestera]\n   lr : prestera_bridge_port_join+0x2cc/0x350 [prestera]\n   sp : ffff800011a1b0f0\n   ...\n   x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122\n    Call trace:\n   prestera_bridge_destroy+0x2c/0xb0 [prestera]\n   prestera_bridge_port_join+0x2cc/0x350 [prestera]\n   prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera]\n   prestera_netdev_event_handler+0xf4/0x110 [prestera]\n   raw_notifier_call_chain+0x54/0x80\n   call_netdevice_notifiers_info+0x54/0xa0\n   __netdev_upper_dev_link+0x19c/0x380","modified":"2026-03-15T22:43:15.343336Z","published":"2024-05-24T15:15:21.263Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253"},{"type":"FIX","url":"https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.10"},{"fixed":"5.10.83"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47564.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}