CVE-2021-47518

In the Linux kernel, the following vulnerability has been resolved: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done The done() netlink callback nfc_genl_dump_ses_done() should check if received argument is non-NULL, because its allocation could fail earlier in dumpit() (nfc_genl_dump_ses()).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d - Patch () https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d - Patch
References () https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a - Patch () https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a - Patch
References () https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10 - Patch () https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10 - Patch
References () https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18 - Patch () https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18 - Patch
References () https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa - Patch () https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa - Patch
References () https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c - Patch () https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c - Patch
References () https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed - Patch () https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed - Patch
References () https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca - Patch () https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca - Patch

10 Jun 2024, 18:43

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d - () https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d - Patch
References () https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a - () https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a - Patch
References () https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10 - () https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10 - Patch
References () https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18 - () https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18 - Patch
References () https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa - () https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa - Patch
References () https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c - () https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c - Patch
References () https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed - () https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed - Patch
References () https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca - () https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: nfc: corrige la posible deref del puntero NULL en nfc_genl_dump_ses_done La devolución de llamada de netlink done() nfc_genl_dump_ses_done() debe verificar si el argumento recibido no es NULL, porque su asignación podría fallar antes en dumpit() (nfc_genl_dump_ses()).
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47518

Mitre link : CVE-2021-47518

CVE.ORG link : CVE-2021-47518


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference