Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47556
HistoryMay 24, 2024 - 12:00 a.m.

CVE-2021-47556

2024-05-2400:00:00
ubuntu.com
ubuntu.com
3
linux
kernel
ethtool
vulnerability
patch
ioctl
null deref
coalesce
netlink

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

In the Linux kernel, the following vulnerability has been resolved:
ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()
ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is buggy,
so changing the coalesce settings on a device where the driver provides
only one of the callbacks results in a NULL pointer dereference instead
of an -EOPNOTSUPP. Fix the condition so that the availability of both
callbacks is ensured. This also matches the netlink code. Note that
reproducing this requires some effort - it only affects the legacy ioctl
path, and needs a specific combination of driver options: - have
.get_coalesce() and .coalesce_supported but no .set_coalesce(), or - have
.set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn’t cause the
crash as it first attempts to call ethtool_get_coalesce() and bails out on
error.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for UB:CVE-2021-47556