Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47333 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90491
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47333
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the alcor_pci_init_check_aspm() function in drivers/misc/cardreader/alcor_pci.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 5.14 rc7
CPE2.3https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.19
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.134
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.