![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47557 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_ets: don't peek at classes beyond 'nbands' when the
number of DRR classes decreases, the round-robin active list can
contain elements that have already been freed in ets_qdisc_change().
As a consequence, it's possible to see a NULL dereference crash,
caused by the attempt to call cl->qdisc->ops->peek(cl->qdisc) when
cl->qdisc is NULL: BUG: kernel NULL pointer dereference, address:
0000000000000018 #PF: supervisor read access in kernel mode #PF:
error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1]
PREEMPT SMP NOPTI CPU: 1 PID: 910 Comm: mausezahn Not tainted
5.16.0-rc1+ #475 Hardware name: Red Hat KVM, BIOS
1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 RIP:
0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets] Code: c5 01 41 39 ad e4
02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00
00 00 49 8b ad c0 02 00 00 48 8b 7d 10 <48> 8b 47 18 48 8b 40 38 0f ae
e8 ff d0 48 89 c3 48 85 c0 0f 84 9d RSP: 0000:ffffbb36c0b5fdd8 EFLAGS:
00010287 RAX: ffff956678efed30 RBX: 0000000000000000 RCX:
0000000000000000 RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI:
0000000000000000 RBP: ffff956678efed30 R08: e2f3207fe360129c R09:
0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12:
ffff956678efeac0 R13: ffff956678efe800 R14: ffff956611545000 R15:
ffff95667ac8f100 FS: 00007f2aa9120740(0000) GS:ffff95667b800000(0000)
knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 CR2: 0000000000000018 CR3: 000000011070c000 CR4:
0000000000350ee0 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47557 https://git.kernel.org/stable/c/ae2659d2c670252759ee9c823c4e039c0e05a6f2 https://git.kernel.org/stable/c/ae2659d2c670252759ee9c823c4e039c0e05a6f2 https://git.kernel.org/stable/c/de6d25924c2a8c2988c6a385990cafbe742061bf https://git.kernel.org/stable/c/de6d25924c2a8c2988c6a385990cafbe742061bf https://git.kernel.org/stable/c/e25bdbc7e951ae5728fee1f4c09485df113d013c https://git.kernel.org/stable/c/e25bdbc7e951ae5728fee1f4c09485df113d013c |