{"id":"CVE-2021-47239","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.","modified":"2026-03-13T05:20:38.004322Z","published":"2024-05-21T15:15:13.100Z","related":["SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1","SUSE-SU-2025:01995-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/c4e3be2e7742863e454ce31faf8fd0109c00050b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/14616c372a7be01a2fb8c56c9d8debd232b9e43d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/2fc8300c9cfa5167fcb5b1a2a07db6f53e82f59b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4252bf6c2b245f47011098113d405ffad6ad5d5b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/56b786d86694e079d8aad9b314e015cd4ac02a3d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/570a52cf3e01d19f7fd1a251dfc52b0cd86c13cb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/64160d1741a3de5204d1a822e058e0b4cc526504"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7cc8b2e05fcea6edd022d26e82091d781af8fd9b"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.4.271"},{"fixed":"4.4.274"}]},{"events":[{"introduced":"4.9.271"},{"fixed":"4.9.274"}]},{"events":[{"introduced":"4.14.235"},{"fixed":"4.14.238"}]},{"events":[{"introduced":"4.19.193"},{"fixed":"4.19.196"}]},{"events":[{"introduced":"5.4.124"},{"fixed":"5.4.128"}]},{"events":[{"introduced":"5.10.42"},{"fixed":"5.10.46"}]},{"events":[{"introduced":"5.12.9"},{"fixed":"5.12.13"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47239.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}