In the Linux kernel, the following vulnerability has been resolved: cxgb4:
avoid accessing registers when clearing filters Hardware register having
the server TID base can contain invalid values when adapter is in bad state
(for example, due to AER fatal error). Reading these invalid values in the
register can lead to out-of-bound memory access. So, fix by using the saved
server TID base when clearing filters.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < any | UNKNOWN |
git.kernel.org/stable/c/02f03883fdb10ad7e66717c70ea163a8d27ae6e7
git.kernel.org/stable/c/0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf
git.kernel.org/stable/c/285207a558ab456aa7d8aa877ecc7e91fcc51710
git.kernel.org/stable/c/88c380df84fbd03f9b137c2b9d0a44b9f2f553b0
launchpad.net/bugs/cve/CVE-2021-47138
nvd.nist.gov/vuln/detail/CVE-2021-47138
security-tracker.debian.org/tracker/CVE-2021-47138
www.cve.org/CVERecord?id=CVE-2021-47138