Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2021-47138
HistoryMar 25, 2024 - 9:07 a.m.

CVE-2021-47138 cxgb4: avoid accessing registers when clearing filters

2024-03-2509:07:37
Linux
github.com
5
linux kernel
vulnerability
cxgb4
hardware register
aer fatal error
out-of-bound memory access

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

cxgb4: avoid accessing registers when clearing filters

Hardware register having the server TID base can contain
invalid values when adapter is in bad state (for example,
due to AER fatal error). Reading these invalid values in the
register can lead to out-of-bound memory access. So, fix
by using the saved server TID base when clearing filters.

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c"
    ],
    "versions": [
      {
        "version": "b1a79360ee86",
        "lessThan": "0bf49b3c8d8b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "b1a79360ee86",
        "lessThan": "02f03883fdb1",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "b1a79360ee86",
        "lessThan": "285207a558ab",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "b1a79360ee86",
        "lessThan": "88c380df84fb",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c"
    ],
    "versions": [
      {
        "version": "5.2",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.2",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.124",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.42",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.12.9",
        "lessThanOrEqual": "5.12.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.13",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial