Out-of-bounds read in Linux kernel block



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-46984
CWE-ID CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU90355

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-46984

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dd_request_merge() function in block/mq-deadline.c, within the kyber_limit_depth() function in block/kyber-iosched.c, within the __blk_mq_sched_bio_merge() function in block/blk-mq-sched.c, within the bfq_remove_request() function in block/bfq-iosched.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.9 rc1 - 6.9.3

CPE2.3 External links

http://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5
http://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f
http://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6
http://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df
http://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###