{"id":"CVE-2021-47605","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvduse: fix memory corruption in vduse_dev_ioctl()\n\nThe \"config.offset\" comes from the user.  There needs to a check to\nprevent it being out of bounds.  The \"config.offset\" and\n\"dev-\u003econfig_size\" variables are both type u32.  So if the offset if\nout of bounds then the \"dev-\u003econfig_size - config.offset\" subtraction\nresults in a very high u32 value.  The out of bounds offset can result\nin memory corruption.","modified":"2026-03-13T05:16:33.465632Z","published":"2024-06-19T15:15:55.067Z","related":["SUSE-SU-2024:2372-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2939-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/e6c67560b4341914bec32ec536e931c22062af65"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ff9f9c6e74848170fcb45c8403c80d661484c8c9"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.15"},{"fixed":"5.15.11"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc5"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47605.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}