Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47295
HistoryMay 21, 2024 - 12:00 a.m.

CVE-2021-47295

2024-05-2100:00:00
ubuntu.com
ubuntu.com
2
linux kernel
vulnerability
net sched
memory leak
fix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved: net:
sched: fix memory leak in tcindex_partial_destroy_work Syzbot reported
memory leak in tcindex_set_parms(). The problem was in non-freed perfect
hash in tcindex_partial_destroy_work(). In tcindex_set_parms() new
tcindex_data is allocated and some fields from old one are copied to new
one, but not the perfect hash. Since tcindex_partial_destroy_work() is the
destroy function for old tcindex_data, we need to free perfect hash to
avoid memory leak.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0

Percentile

15.5%