In the Linux kernel, the following vulnerability has been resolved:
net: dsa: fix a crash if ->get_sset_count() fails
If ds->ops->get_sset_count() fails then it "count" is a negative error
code such as -EOPNOTSUPP. Because "i" is an unsigned int, the negative
error code is type promoted to a very high value and the loop will
corrupt memory until the system crashes.
Fix this by checking for error codes and changing the type of "i" to
just int.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 21:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-835 | |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 - Patch | |
References | () https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373 - Patch | |
References | () https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83 - Patch | |
References | () https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 - Patch | |
References | () https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8 - Patch |
Information
Published : 2024-03-25 10:15
Updated : 2025-03-13 21:24
NVD link : CVE-2021-47159
Mitre link : CVE-2021-47159
CVE.ORG link : CVE-2021-47159
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')