
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-47605 affects the Linux kernel's vduse (vDPA Device in Userspace) component. The vulnerability was discovered in December 2021 and involves a memory corruption issue in the vduse_dev_ioctl() function. The vulnerability affects Linux kernel versions from 5.15 through 5.15.11, and 5.16-rc1 through 5.16-rc5 (NVD).
The vulnerability stems from improper validation of the config.offset parameter in the vduse_dev_ioctl() function. Both config.offset and dev->config_size variables are of type u32, and when the offset is out of bounds, the subtraction operation dev->config_size - config.offset results in a very high u32 value due to integer overflow. This can lead to memory corruption when the offset is out of bounds (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 HIGH with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability can result in memory corruption, which could lead to system crashes, information disclosure, or potential privilege escalation. The high CVSS score indicates serious potential impacts on system confidentiality, integrity, and availability (NVD).
The vulnerability has been fixed in the Linux kernel through a patch that adds proper bounds checking for the config.offset parameter. The fix includes additional validation to prevent out-of-bounds access by checking if config.offset is greater than dev->config_size before performing the subtraction operation (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."