CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
15.5%
In the Linux kernel, the following vulnerability has been resolved: tipc:
check for null after calling kmemdup kmemdup can return a null pointer so
need to check for it, otherwise the null key will be dereferenced later in
tipc_crypto_key_xmit as can be seen in the trace [1]. [1]
https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/linus/3e6db079751afd527bf3db32314ae938dc571916 (5.16-rc2)
git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916
git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10
git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9
launchpad.net/bugs/cve/CVE-2021-47186
nvd.nist.gov/vuln/detail/CVE-2021-47186
security-tracker.debian.org/tracker/CVE-2021-47186
www.cve.org/CVERecord?id=CVE-2021-47186