In the Linux kernel, the following vulnerability has been resolved:
ethernet: hisilicon: hns: hnsdsafmisc: fix a possible array overflow in hnsdsafgesrstby_port()
The if statement: if (port >= DSAFGENUM) return;
limits the value of port less than DSAFGENUM (i.e., 8). However, if the value of port is 6 or 7, an array overflow could occur: portrstoff = dsafdev->maccb[port]->portrstoff;
because the length of dsafdev->maccb is DSAFMAXPORT_NUM (i.e., 6).
To fix this possible array overflow, we first check port and if it is greater than or equal to DSAFMAXPORT_NUM, the function returns.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47548.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.292"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.257"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.220"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.164"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.84"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.16-rc1"
}
]
}
]