Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-46915 |
CWE-ID | CWE-682 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU88215
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-46915
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nft_limit_init() function in net/netfilter/nft_limit.c. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/9065ccb9ec92c5120e7e97958397ebdb454f23d6
http://git.kernel.org/stable/c/fadd3c4afdf3d4c21f4d138502f8b76334987e26
http://git.kernel.org/stable/c/01fb1626b620cb37a65ad08e0f626489e8f042ef
http://git.kernel.org/stable/c/dc1732baa9da5b68621586bf8636ebbc27dc62d2
http://git.kernel.org/stable/c/1bb3ee4259936cc3b2d80a4a480bbb4868575071
http://git.kernel.org/stable/c/b895bdf5d643b6feb7c60856326dd4feb6981560
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.