Unrated severityNVD Advisory· Published May 21, 2024· Updated Dec 18, 2025
virtio-net: Add validation for used length
CVE-2021-47352
Description
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: Add validation for used length
This adds validation for used length (might come from an untrusted device) to avoid data corruption or loss.
Affected products
60- osv-coords59 versionspkg:rpm/almalinux/bpftoolpkg:rpm/almalinux/kernelpkg:rpm/almalinux/kernel-abi-stablelistspkg:rpm/almalinux/kernel-corepkg:rpm/almalinux/kernel-cross-headerspkg:rpm/almalinux/kernel-debugpkg:rpm/almalinux/kernel-debug-corepkg:rpm/almalinux/kernel-debug-develpkg:rpm/almalinux/kernel-debug-modulespkg:rpm/almalinux/kernel-debug-modules-extrapkg:rpm/almalinux/kernel-develpkg:rpm/almalinux/kernel-docpkg:rpm/almalinux/kernel-headerspkg:rpm/almalinux/kernel-modulespkg:rpm/almalinux/kernel-modules-extrapkg:rpm/almalinux/kernel-rtpkg:rpm/almalinux/kernel-rt-corepkg:rpm/almalinux/kernel-rt-debugpkg:rpm/almalinux/kernel-rt-debug-corepkg:rpm/almalinux/kernel-rt-debug-develpkg:rpm/almalinux/kernel-rt-debug-kvmpkg:rpm/almalinux/kernel-rt-debug-modulespkg:rpm/almalinux/kernel-rt-debug-modules-extrapkg:rpm/almalinux/kernel-rt-develpkg:rpm/almalinux/kernel-rt-kvmpkg:rpm/almalinux/kernel-rt-modulespkg:rpm/almalinux/kernel-rt-modules-extrapkg:rpm/almalinux/kernel-toolspkg:rpm/almalinux/kernel-tools-libspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/almalinux/kernel-zfcpdumppkg:rpm/almalinux/kernel-zfcpdump-corepkg:rpm/almalinux/kernel-zfcpdump-develpkg:rpm/almalinux/kernel-zfcpdump-modulespkg:rpm/almalinux/kernel-zfcpdump-modules-extrapkg:rpm/almalinux/perfpkg:rpm/almalinux/python3-perfpkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_57&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.18.0-553.22.1.el8_10+ 58 more
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.rt7.363.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.18.0-553.22.1.el8_10
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663cmitre
- git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758mitre
- git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292mitre
- git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462mitre
- git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813mitre
News mentions
0No linked articles in our index yet.