SB2024062561 - Resource management error in Linux kernel sched
Published: June 25, 2024 Updated: May 13, 2025
Security Bulletin ID
SB2024062561
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Resource management error (CVE-ID: CVE-2021-47419)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the taprio_destroy() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/c951c08a5996365aecbc5f1a9bddec3905e1ddfc
- https://git.kernel.org/stable/c/3ec73ffeef54596c32aff0e73fe60971b9c8b866
- https://git.kernel.org/stable/c/7a1c1af341041221b3acb9d7036cc2b43e0efa75
- https://git.kernel.org/stable/c/a56d447f196fa9973c568f54c0d76d5391c3b0c0
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.73
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.153