SB2024060542 - Integer overflow in Linux kernel
Published: June 5, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2021-47432)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the __genradix_iter_peek() function in lib/generic-radix-tree.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac
- https://git.kernel.org/stable/c/ec298b958cb0c40d70c68079da933c8f31c5134c
- https://git.kernel.org/stable/c/aa7f1827953100cdde0795289a80c6c077bfe437
- https://git.kernel.org/stable/c/9492261ff2460252cf2d8de89cdf854c7e2b28a0
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7