Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-46989 |
CWE-ID | CWE-833 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU89261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-46989
CWE-ID:
CWE-833 - Deadlock
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to deadlock within the inhfsplus_file_truncate() function in fs/hfsplus/extents.c. A local user can crash the system.
Install updates from vendor's website.
Vulnerable software versionsLinux kernel: 4.19 - 5.13 rc5
CPE2.3https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a
https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c
https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99
https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685
https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446
https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.191
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.38
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.22
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.5
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.120
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.