CVE-2021-47560
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
24/05/2024
Last modified:
06/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mlxsw: spectrum: Protect driver from buggy firmware<br />
<br />
When processing port up/down events generated by the device&#39;s firmware,<br />
the driver protects itself from events reported for non-existent local<br />
ports, but not the CPU port (local port 0), which exists, but lacks a<br />
netdev.<br />
<br />
This can result in a NULL pointer dereference when calling<br />
netif_carrier_{on,off}().<br />
<br />
Fix this by bailing early when processing an event reported for the CPU<br />
port. Problem was only observed when running on top of a buggy emulator.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.10.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
- https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9
- https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df
- https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
- https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9
- https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df



