SB2024053060 - Memory leak in Linux kernel sched
Published: May 30, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2021-47295)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tcindex_filter_result_init() and tcindex_partial_destroy_work() functions in net/sched/cls_tcindex.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/8d7924ce85bae64e7a67c366c7c50840f49f3a62
- https://git.kernel.org/stable/c/8e9662fde6d63c78eb1350f6167f64c9d71a865b
- https://git.kernel.org/stable/c/cac71d27745f92ee13f0ecc668ffe151a4a9c9b1
- https://git.kernel.org/stable/c/f5051bcece50140abd1a11a2d36dc3ec5484fc32
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.54
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.136