SB2024062485 - Buffer overflow in Linux kernel net driver
Published: June 24, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2021-47352)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the receive_small(), rcu_read_unlock() and receive_mergeable() functions in drivers/net/virtio_net.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813
- https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c
- https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292
- https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.51
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.18
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.293