Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43975

Опубликовано: 17 нояб. 2021
Источник: debian
EPSS Низкий

Описание

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.5-2package
linuxfixed5.10.84-1bullseyepackage

Примечания

  • https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/

EPSS

Процентиль: 3%
0.00018
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 3 лет назад

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

CVSS3: 6.7
redhat
больше 3 лет назад

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

CVSS3: 6.7
nvd
больше 3 лет назад

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

CVSS3: 6.7
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 6.7
github
около 3 лет назад

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

EPSS

Процентиль: 3%
0.00018
Низкий