Unrated severityNVD Advisory· Published Mar 25, 2024· Updated Dec 18, 2025
net: fujitsu: fix potential null-ptr-deref
CVE-2021-47149
Description
In the Linux kernel, the following vulnerability has been resolved:
net: fujitsu: fix potential null-ptr-deref
In fmvj18x_get_hwinfo(), if ioremap fails there will be NULL pointer deref. To fix this, check the return value of ioremap and return -1 to the caller in case of failure.
Affected products
24- osv-coords22 versionspkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_56&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-16.182.1+ 21 more
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-10.182.1
- (no CPE)range: < 4.12.14-10.182.1
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-10.182.1
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-16.182.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-122.216.1
- (no CPE)range: < 4.12.14-10.182.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/22049c3d40f08facd1867548716a484dad6b3251mitre
- git.kernel.org/stable/c/52202be1cd996cde6e8969a128dc27ee45a7cb5emitre
- git.kernel.org/stable/c/6dbf1101594f7c76990b63c35b5a40205a914b6bmitre
- git.kernel.org/stable/c/71723a796ab7881f491d663c6cd94b29be5fba50mitre
- git.kernel.org/stable/c/7883d3895d0fbb0ba9bff0f8665f99974b45210fmitre
- git.kernel.org/stable/c/b92170e209f7746ed72eaac98f2c2f4b9af734e6mitre
- git.kernel.org/stable/c/c4f1c23edbe921ab2ecd6140d700e756cd44c5f7mitre
- git.kernel.org/stable/c/f14bf57a08779a5dee9936f63ada0149ea89c5e6mitre
News mentions
0No linked articles in our index yet.