CVE-2021-47172 Affecting kernel-source package, versions <5.3.18-150200.24.188.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES152-KERNELSOURCE-6691351
  • published29 Apr 2024
  • disclosed26 Apr 2024

Introduced: 26 Apr 2024

CVE-2021-47172  (opens in a new tab)

How to fix?

Upgrade SLES:15.2 kernel-source to version 5.3.18-150200.24.188.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-source package and not the kernel-source package as distributed by SLES. See How to fix? for SLES:15.2 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers

Channel numbering must start at 0 and then not have any holes, or it is possible to overflow the available storage. Note this bug was introduced as part of a fix to ensure we didn't rely on the ordering of child nodes. So we need to support arbitrary ordering but they all need to be there somewhere.

Note I hit this when using qemu to test the rest of this series. Arguably this isn't the best fix, but it is probably the most minimal option for backporting etc.

Alexandru's sign-off is here because he carried this patch in a larger set that Jonathan then applied.

CVSS Scores

version 3.1