CVE-2021-47137

In the Linux kernel, the following vulnerability has been resolved: net: lantiq: fix memory corruption in RX ring In a situation where memory allocation or dma mapping fails, an invalid address is programmed into the descriptor. This can lead to memory corruption. If the memory allocation fails, DMA should reuse the previous skb and mapping and drop the packet. This patch also increments rx drop counter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

19 Mar 2025, 16:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2 - () https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2 - Patch
References () https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418 - () https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418 - Patch
References () https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d - () https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d - Patch
References () https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 - () https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2 - () https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2 -
References () https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418 - () https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418 -
References () https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d - () https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d -
References () https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 - () https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 -

05 Nov 2024, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-770

25 Mar 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 09:15

Updated : 2025-03-19 16:27


NVD link : CVE-2021-47137

Mitre link : CVE-2021-47137

CVE.ORG link : CVE-2021-47137


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-770

Allocation of Resources Without Limits or Throttling