In the Linux kernel, the following vulnerability has been resolved: net:
lantiq: fix memory corruption in RX ring In a situation where memory
allocation or dma mapping fails, an invalid address is programmed into the
descriptor. This can lead to memory corruption. If the memory allocation
fails, DMA should reuse the previous skb and mapping and drop the packet.
This patch also increments rx drop counter.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2
git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418
git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d
git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20
launchpad.net/bugs/cve/CVE-2021-47137
nvd.nist.gov/vuln/detail/CVE-2021-47137
security-tracker.debian.org/tracker/CVE-2021-47137
www.cve.org/CVERecord?id=CVE-2021-47137