In the Linux kernel, the following vulnerability has been resolved:
devlink: fix netns refcount leak in devlink_nl_cmd_reload() While preparing
my patch series adding netns refcount tracking, I spotted bugs in
devlink_nl_cmd_reload() Some error paths forgot to release a refcount on a
netns. To fix this, we can reduce the scope of get_net()/put_net() section
around the call to devlink_reload().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/4dbb0dad8e63fcd0b5a117c2861d2abe7ff5f186 (5.16-rc5)
git.kernel.org/stable/c/4b7e90672af8e0c78205db006f1b0a20ebd07f5f
git.kernel.org/stable/c/4dbb0dad8e63fcd0b5a117c2861d2abe7ff5f186
git.kernel.org/stable/c/fe30b70ca84da9c4aca85c03ad86e7a9b89c5ded
launchpad.net/bugs/cve/CVE-2021-47514
nvd.nist.gov/vuln/detail/CVE-2021-47514
security-tracker.debian.org/tracker/CVE-2021-47514
www.cve.org/CVERecord?id=CVE-2021-47514