2024-05-24 16:00:34 +00:00
{
2024-05-24 16:00:48 +00:00
"data_version" : "4.0" ,
2024-05-24 16:00:34 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2021-47548" ,
2024-05-24 16:00:48 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2024-05-24 16:00:34 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-05-24 16:00:48 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port >= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off;\n\nbecause the length of dsaf_dev->mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "1da177e4c3f4" ,
"version_value" : "948968f87476"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "4.9.292" ,
"lessThanOrEqual" : "4.9.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "4.14.257" ,
"lessThanOrEqual" : "4.14.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "4.19.220" ,
"lessThanOrEqual" : "4.19.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "5.4.164" ,
"lessThanOrEqual" : "5.4.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "5.10.84" ,
"lessThanOrEqual" : "5.10.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "5.15.7" ,
"lessThanOrEqual" : "5.15.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "5.16" ,
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/948968f8747650447c8f21c9fdba0e1973be040b" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/948968f8747650447c8f21c9fdba0e1973be040b"
} ,
{
"url" : "https://git.kernel.org/stable/c/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1"
} ,
{
"url" : "https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff"
} ,
{
"url" : "https://git.kernel.org/stable/c/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d"
} ,
{
"url" : "https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803"
} ,
{
"url" : "https://git.kernel.org/stable/c/fc7ffa7f10b9454a86369405d9814bf141b30627" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/fc7ffa7f10b9454a86369405d9814bf141b30627"
} ,
{
"url" : "https://git.kernel.org/stable/c/a66998e0fbf213d47d02813b9679426129d0d114" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/a66998e0fbf213d47d02813b9679426129d0d114"
2024-05-24 16:00:34 +00:00
}
]
2024-05-24 16:00:48 +00:00
} ,
"generator" : {
2024-05-28 20:02:20 +00:00
"engine" : "bippy-a5840b7849dd"
2024-05-24 16:00:34 +00:00
}
}