CVE-2021-47559

Source
https://cve.org/CVERecord?id=CVE-2021-47559
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47559.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47559
Downstream
Related
Published
2024-05-24T15:15:20.537Z
Modified
2026-03-14T11:19:15.866579Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereferencing in smcvlanby_tcpsk()

Coverity reports a possible NULL dereferencing problem:

in smcvlanbytcpsk(): 6. returnednull: netdevlowergetnext returns NULL (checked 29 out of 30 times). 7. varassigned: Assigning: ndev = NULL return value from netdevlowergetnext. 1623 ndev = (struct netdevice *)netdevlowergetnext(ndev, &lower); CID 1468509 (#1 of 1): Dereference null return value (NULLRETURNS) 8. dereference: Dereferencing a pointer that might be NULL ndev when calling isvlandev. 1624 if (isvlandev(ndev)) {

Remove the manual implementation and use netdevwalkalllowerdev() to iterate over the lower devices. While on it remove an obsolete function parameter comment.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "4.18"
            },
            {
                "fixed": "5.10.83"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.11"
            },
            {
                "fixed": "5.15.6"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47559.json"