SB20240531308 - NULL pointer dereference in Linux kernel sched
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2021-47557)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/ae2659d2c670252759ee9c823c4e039c0e05a6f2
- https://git.kernel.org/stable/c/e25bdbc7e951ae5728fee1f4c09485df113d013c
- https://git.kernel.org/stable/c/de6d25924c2a8c2988c6a385990cafbe742061bf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.83
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16