Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context() This function is called from ethtool_set_rxfh() and "*rss_context" comes from the user. Add some bounds checking to prevent memory corruption.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.12, < 5.12.9 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7Patch
- https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214Patch
- https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7Patch
- https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214Patch
FAQ
What is CVE-2021-47148?
CVE-2021-47148 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context() This function is called from ethtool_set_rxfh() and "*rss_context" ...
How severe is CVE-2021-47148?
CVE-2021-47148 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47148?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.