Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47288 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90297
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47288
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ngene_command_config_free_buf() function in drivers/media/pci/ngene/ngene-core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.14 rc7
CPE2.3https://git.kernel.org/stable/c/4487b968e5eacd02c493303dc2b61150bb7fe4b2
https://git.kernel.org/stable/c/c6ddeb63dd543b5474b0217c4e47538b7ffd7686
https://git.kernel.org/stable/c/e818f2ff648581a6c553ae2bebc5dcef9a8bb90c
https://git.kernel.org/stable/c/ec731c6ef564ee6fc101fc5d73e3a3a953d09a00
https://git.kernel.org/stable/c/e617fa62f6cf859a7b042cdd6c73af905ff8fca3
https://git.kernel.org/stable/c/e991457afdcb5f4dbc5bc9d79eaf775be33e7092
https://git.kernel.org/stable/c/b9a178f189bb6d75293573e181928735f5e3e070
https://git.kernel.org/stable/c/8d4abca95ecc82fc8c41912fa0085281f19cc29f
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.241
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.199
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.277
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.277
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.54
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.136
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.