Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47559
HistoryMay 24, 2024 - 12:00 a.m.

CVE-2021-47559

2024-05-2400:00:00
ubuntu.com
ubuntu.com
7
linux kernel
vulnerability
null pointer
dereferencing
smc_vlan_by_tcpsk

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:
net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() Coverity
reports a possible NULL dereferencing problem: in smc_vlan_by_tcpsk(): 6.
returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30
times). 7. var_assigned: Assigning: ndev = NULL return value from
netdev_lower_get_next. 1623 ndev = (struct net_device
*)netdev_lower_get_next(ndev, &lower); CID 1468509 (#1 of 1): Dereference
null return value (NULL_RETURNS) 8. dereference: Dereferencing a pointer
that might be NULL ndev when calling is_vlan_dev. 1624 if
(is_vlan_dev(ndev)) { Remove the manual implementation and use
netdev_walk_all_lower_dev() to iterate over the lower devices. While on it
remove an obsolete function parameter comment.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%