In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: refuse to enable an unbound pipe This ioctl() implicitly
assumed that the socket was already bound to a valid local socket name,
i.e. Phonet object. If the socket was not bound, two separate problems
would occur: 1) We’d send an pipe enablement request with an invalid source
object. 2) Later socket calls could BUG on the socket unexpectedly being
connected yet not bound to a valid object.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/75a2f31520095600f650597c0ac41f48b5ba0068 (5.16-rc7)
git.kernel.org/stable/c/0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59
git.kernel.org/stable/c/311601f114859d586d5ef8833d60d3aa23282161
git.kernel.org/stable/c/48c76fc53582e7f13c1e0b11c916e503256c4d0b
git.kernel.org/stable/c/52ad5da8e316fa11e3a50b3f089aa63e4089bf52
git.kernel.org/stable/c/53ccdc73eedaf0e922c45b569b797d2796fbaafa
git.kernel.org/stable/c/75a2f31520095600f650597c0ac41f48b5ba0068
git.kernel.org/stable/c/982b6ba1ce626ef87e5c29f26f2401897554f235
git.kernel.org/stable/c/b10c7d745615a092a50c2e03ce70446d2bec2aca
launchpad.net/bugs/cve/CVE-2021-47086
nvd.nist.gov/vuln/detail/CVE-2021-47086
security-tracker.debian.org/tracker/CVE-2021-47086
www.cve.org/CVERecord?id=CVE-2021-47086