In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()
This function is called from ethtool_set_rxfh() and "*rss_context"
comes from the user. Add some bounds checking to prevent memory
corruption.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Dec 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
|
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-25T09:07:44.472Z
Updated: 2024-12-19T07:36:09.408Z
Reserved: 2024-03-04T18:12:48.845Z
Link: CVE-2021-47148
Vulnrichment
Updated: 2024-08-04T05:24:40.199Z
NVD
Status : Analyzed
Published: 2024-03-25T09:15:09.150
Modified: 2024-12-12T14:35:05.817
Link: CVE-2021-47148
Redhat