Updated: 2024-09-13 03:34:28.240582
Description:
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | NONE | 0 |
CVSS Version 3.x | MEDIUM | 6.1 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | kernel | 5.14.0 | 6.1 | MEDIUM | Needs Triage | 2024-11-12 04:33:48 | ||
AlmaLinux 9.2 FIPS | kernel | 5.14.0 | 6.1 | MEDIUM | Ignored | 2024-11-14 04:33:37 | ||
Ubuntu 16.04 ELS | linux | 4.4.0 | 6.1 | MEDIUM | Ignored | 2024-09-13 12:17:57 | ||
Ubuntu 18.04 ELS | linux | 4.15.0 | 6.1 | MEDIUM | Not Vulnerable | 2024-09-17 12:27:45 |