![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47588 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
sit: do not call ipip6_dev_free() from sit_init_net() ipip6_dev_free
is sit dev->priv_destructor, already called by register_netdevice() if
something goes wrong. Alternative would be to make ipip6_dev_free()
robust against multiple invocations, but other drivers do not
implement this strategy. syzbot reported: dst_release underflow
WARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0
net/core/dst.c:173 Modules linked in: CPU: 1 PID: 5059 Comm: syz-
executor.4 Not tainted 5.16.0-rc5-syzkaller #0 Hardware name: Google
Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173 Code: 4c 89 f2 89
d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05
01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 <0f> 0b eb 85 0f 1f 40 00
53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48 RSP: 0018:ffffc9000aa5faa0
EFLAGS: 00010246 RAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX:
0000000000040000 RDX: ffffc90005e19000 RSI: 000000000003ffff RDI:
0000000000040000 RBP: 0000000000000000 R08: ffffffff816a1f42 R09:
ffffed1017344f2c R10: ffffed1017344f2c R11: 0000000000000000 R12:
0000607f462b1358 R13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15:
dffffc0000000000 FS: 00007f66c71a2700(0000) GS:ffff8880b9a00000(0000)
knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 CR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4:
00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47588 https://git.kernel.org/stable/c/44a6c846bc3a7efe7d394bab8b2ae3b7f580e190 https://git.kernel.org/stable/c/44a6c846bc3a7efe7d394bab8b2ae3b7f580e190 https://git.kernel.org/stable/c/4e1797914d8f223726ff6ae5ece4f97d73f21bab https://git.kernel.org/stable/c/4e1797914d8f223726ff6ae5ece4f97d73f21bab https://git.kernel.org/stable/c/6f46c59e60b64620d5d386c8ee2eaa11ebe3b595 https://git.kernel.org/stable/c/6f46c59e60b64620d5d386c8ee2eaa11ebe3b595 https://git.kernel.org/stable/c/ad0ed314d6167b212939e3839428ba0c8bb16adb https://git.kernel.org/stable/c/ad0ed314d6167b212939e3839428ba0c8bb16adb https://git.kernel.org/stable/c/e28587cc491ef0f3c51258fdc87fbc386b1d4c59 https://git.kernel.org/stable/c/e28587cc491ef0f3c51258fdc87fbc386b1d4c59 https://git.kernel.org/stable/c/e56b65c1e74d7f706d74b51baba15187be2fb4b5 https://git.kernel.org/stable/c/e56b65c1e74d7f706d74b51baba15187be2fb4b5 |