Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47548
HistoryMay 24, 2024 - 12:00 a.m.

CVE-2021-47548

2024-05-2400:00:00
ubuntu.com
ubuntu.com
linux
kernel
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in
hns_dsaf_ge_srst_by_port() The if statement: if (port >= DSAF_GE_NUM)
return; limits the value of port less than DSAF_GE_NUM (i.e., 8). However,
if the value of port is 6 or 7, an array overflow could occur: port_rst_off
= dsaf_dev->mac_cb[port]->port_rst_off; because the length of
dsaf_dev->mac_cb is DSAF_MAX_PORT_NUM (i.e., 6). To fix this possible array
overflow, we first check port and if it is greater than or equal to
DSAF_MAX_PORT_NUM, the function returns.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%