CVE-2021-47159

In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix a crash if ->get_sset_count() fails If ds->ops->get_sset_count() fails then it "count" is a negative error code such as -EOPNOTSUPP. Because "i" is an unsigned int, the negative error code is type promoted to a very high value and the loop will corrupt memory until the system crashes. Fix this by checking for error codes and changing the type of "i" to just int.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

13 Mar 2025, 21:24

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 - () https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 - Patch
References () https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373 - () https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373 - Patch
References () https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83 - () https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83 - Patch
References () https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 - () https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 - Patch
References () https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8 - () https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
CWE CWE-835

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 - () https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 -
References () https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373 - () https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373 -
References () https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83 - () https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83 -
References () https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 - () https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 -
References () https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8 - () https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8 -

25 Mar 2024, 13:47

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: corrige un bloqueo si ->get_sset_count() falla. Si ds->ops->get_sset_count() falla, entonces "count" es un código de error negativo como - EOPNOTSUPP. Debido a que "i" es un int sin signo, el código de error negativo se promociona a un valor muy alto y el bucle corromperá la memoria hasta que el sistema falle. Solucione este problema buscando códigos de error y cambiando el tipo de "i" a solo int.

25 Mar 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 10:15

Updated : 2025-03-13 21:24


NVD link : CVE-2021-47159

Mitre link : CVE-2021-47159

CVE.ORG link : CVE-2021-47159


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')