Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-46993 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU91104
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-46993
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEFINE_STATIC_KEY_FALSE() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 5.13 rc5
CPE2.3https://git.kernel.org/stable/c/687f523c134b7f0bd040ee1230f6d17990d54172
https://git.kernel.org/stable/c/f7347c85490b92dd144fa1fba9e1eca501656ab3
https://git.kernel.org/stable/c/3da3f804b82a0a382d523a21acf4cf3bb35f936d
https://git.kernel.org/stable/c/42ee47c7e3569d9a0e2cb5053c496d97d380472f
https://git.kernel.org/stable/c/6d2f8909a5fabb73fe2a63918117943986c39b6c
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.38
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.22
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.5
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.120
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.