SB20240531282 - Out-of-bounds read in Linux kernel sched
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2021-46954)
The vulnerability allows a local user to read data or crash the application.
The vulnerability exists due to an out-of-bounds read error within the sch_fragment() function in net/sched/sch_frag.c. A local user can read data or crash the application.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/018bb8da5b5888e19585f9b802f036afe643fcef
- https://git.kernel.org/stable/c/8e6dfb7beeb6489ac1365b8a71052e737f5da76e
- https://git.kernel.org/stable/c/31fe34a0118e0acc958c802e830ad5d37ef6b1d3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.20
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13