CVE-2021-47186

In the Linux kernel, the following vulnerability has been resolved: tipc: check for null after calling kmemdup kmemdup can return a null pointer so need to check for it, otherwise the null key will be dereferenced later in tipc_crypto_key_xmit as can be seen in the trace [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
Configurations

No configuration.

History

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916 - () https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916 -
References () https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10 - () https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10 -
References () https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9 - () https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: tipc: verifique si hay valores nulos después de llamar a kmemdup kmemdup puede devolver un puntero nulo, por lo que es necesario verificarlo; de lo contrario, se eliminará la referencia a la clave nula más adelante en tipc_crypto_key_xmit, como se puede ver en el seguimiento. [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58

08 Jul 2024, 14:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-690

10 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 19:15

Updated : 2024-11-21 06:35


NVD link : CVE-2021-47186

Mitre link : CVE-2021-47186

CVE.ORG link : CVE-2021-47186


JSON object : View

Products Affected

No product.

CWE
CWE-690

Unchecked Return Value to NULL Pointer Dereference