cvelist/2021/47xxx/CVE-2021-47137.json

124 lines
5.9 KiB
JSON
Raw Normal View History

2024-03-04 19:00:35 +00:00
{
2024-04-02 14:15:54 +00:00
"data_version": "4.0",
2024-03-04 19:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-47137",
2024-04-02 14:15:54 +00:00
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
2024-03-04 19:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-02 14:15:54 +00:00
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lantiq: fix memory corruption in RX ring\n\nIn a situation where memory allocation or dma mapping fails, an\ninvalid address is programmed into the descriptor. This can lead\nto memory corruption. If the memory allocation fails, DMA should\nreuse the previous skb and mapping and drop the packet. This patch\nalso increments rx drop counter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
2024-03-04 19:00:35 +00:00
}
]
2024-04-02 14:15:54 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "fe1a56420cf2",
"version_value": "8bb1077448d4"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.20",
"status": "affected"
},
{
"version": "0",
"lessThan": "4.20",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-04-02 14:15:54 +00:00
},
{
"version": "5.4.124",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-04-02 14:15:54 +00:00
},
{
"version": "5.10.42",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-04-02 14:15:54 +00:00
},
{
"version": "5.12.9",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
2024-11-04 12:01:27 +00:00
"versionType": "semver"
2024-04-02 14:15:54 +00:00
},
{
"version": "5.13",
"lessThanOrEqual": "*",
"status": "unaffected",
2024-11-04 13:01:42 +00:00
"versionType": "original_commit_for_fix"
2024-04-02 14:15:54 +00:00
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d"
},
{
"url": "https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418"
},
{
"url": "https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2"
},
{
"url": "https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20"
}
]
},
"generator": {
2024-11-04 13:01:42 +00:00
"engine": "bippy-9e1c9544281a"
2024-03-04 19:00:35 +00:00
}
}