CVE-2021-47605
vduse: fix memory corruption in vduse_dev_ioctl()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: vduse: fix memory corruption in vduse_dev_ioctl() The "config.offset" comes from the user. There needs to a check to
prevent it being out of bounds. The "config.offset" and
"dev->config_size" variables are both type u32. So if the offset if
out of bounds then the "dev->config_size - config.offset" subtraction
results in a very high u32 value. The out of bounds offset can result
in memory corruption.
En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: vduse: corrige corrupción de memoria en vduse_dev_ioctl() El "config.offset" proviene del usuario. Es necesario realizar un control para evitar que esté fuera de los límites. Las variables "config.offset" y "dev->config_size" son ambas del tipo u32. Entonces, si el desplazamiento está fuera de los límites, entonces la resta "dev->config_size - config.offset" da como resultado un valor u32 muy alto. El desplazamiento fuera de los límites puede provocar daños en la memoria.
In the Linux kernel, the following vulnerability has been resolved: vduse: fix memory corruption in vduse_dev_ioctl() The "config.offset" comes from the user. There needs to a check to prevent it being out of bounds. The "config.offset" and "dev->config_size" variables are both type u32. So if the offset if out of bounds then the "dev->config_size - config.offset" subtraction results in a very high u32 value. The out of bounds offset can result in memory corruption.
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bug fixes.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-24 CVE Reserved
- 2024-06-19 CVE Published
- 2025-04-15 EPSS Updated
- 2025-05-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/c8a6153b6c59d95c0e091f053f6f180952ade91e | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://git.kernel.org/stable/c/e6c67560b4341914bec32ec536e931c22062af65 | 2021-12-22 | |
https://git.kernel.org/stable/c/ff9f9c6e74848170fcb45c8403c80d661484c8c9 | 2021-12-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 5.15.11 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 5.15.11" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 5.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 5.16" | en |
Affected
|