In the Linux kernel, the following vulnerability has been resolved:
net: qrtr: fix OOB Read in qrtr_endpoint_post
Syzbot reported slab-out-of-bounds Read in
qrtr_endpoint_post. The problem was in wrong
_size_ type:
if (len != ALIGN(size, 4) + hdrlen)
goto err;
If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of
ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293
in header this check won't fail and
skb_put_data(skb, data + hdrlen, size);
will read out of bound from data, which is hdrlen allocated block.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:19:40.363Z
Updated: 2024-11-04T12:02:06.617Z
Reserved: 2024-04-10T18:59:19.532Z
Link: CVE-2021-47240
Vulnrichment
Updated: 2024-08-04T05:32:08.052Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T15:15:13.177
Modified: 2024-05-21T16:54:26.047
Link: CVE-2021-47240
Redhat