Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() If virtio_gpu_object_shmem_init() fails (e.g. due to fault injection, as it happened in the bug report by syzbot), virtio_gpu_array_put_free() could be called with objs equal to NULL. Ensure that objs is not NULL in virtio_gpu_array_put_free(), or otherwise return from the function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.11.20, < 5.12 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6b79f96f4a23846516e5e6e4dd37fc06f43a60ddPatch
- https://git.kernel.org/stable/c/abc9ad36df16e27ac1c665085157f1a082d39bacPatch
- https://git.kernel.org/stable/c/ac92b474eeeed75b8660374ba1d129a121c09da8Patch
- https://git.kernel.org/stable/c/b094fece3810c71ceee6f0921676cb65d4e68c5aPatch
FAQ
What is CVE-2021-47657?
CVE-2021-47657 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() If virtio_gpu_object_shmem_init() fails (e.g. due to fault...
How severe is CVE-2021-47657?
CVE-2021-47657 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47657?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.