SB2024062453 - Buffer overflow in Linux kernel net
Published: June 24, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2021-47544)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the include/net/sock.h. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/c6f340a331fb72e5ac23a083de9c780e132ca3ae
- https://git.kernel.org/stable/c/5a9afcd827cafe14a95c9fcbded2c2d104f18dfc
- https://git.kernel.org/stable/c/dacb5d8875cc6cd3a553363b4d6f06760fcbe70c
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.84
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16