Логотип exploitDog
bind: "CVE-2021-47517"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2021-47517"

Количество 41

Количество 41

ubuntu логотип

CVE-2021-47517

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-47517

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2021-47517

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-47517

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-10573

около 1 года назад

Уязвимость компонента ethtool ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4240-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4160-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0181-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4227-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4220-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4206-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4141-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4120-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4128-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4228-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4127-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0138-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0260-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4243-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4207-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-47517

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2021-47517

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.1...

CVSS3: 4.4
0%
Низкий
около 1 года назад
nvd логотип
CVE-2021-47517

In the Linux kernel, the following vulnerability has been resolved: ethtool: do not perform operations on net devices being unregistered There is a short period between a net device starts to be unregistered and when it is actually gone. In that time frame ethtool operations could still be performed, which might end up in unwanted or undefined behaviours[1]. Do not allow ethtool operations after a net device starts its unregistration. This patch targets the netlink part as the ioctl one isn't affected: the reference to the net device is taken and the operation is executed within an rtnl lock section and the net device won't be found after unregister. [1] For example adding Tx queues after unregister ends up in NULL pointer exceptions and UaFs, such as: BUG: KASAN: use-after-free in kobject_get+0x14/0x90 Read of size 1 at addr ffff88801961248c by task ethtool/755 CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778 Hardware name: QEMU Standard PC

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2021-47517

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-10573

Уязвимость компонента ethtool ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе

CVSS3: 8.8
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4240-1

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4160-1

Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0181-1

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4227-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4220-1

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4206-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4141-1

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4120-1

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4128-1

Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4228-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4127-1

Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0138-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0260-1

Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4243-1

Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4207-1

Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)

7 месяцев назад

Уязвимостей на страницу