Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47046 |
CWE-ID | CWE-193 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU91176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47046
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the drivers/gpu/drm/amd/display/dc/hdcp/hdcp_msg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.10 - 5.13 rc5
CPE2.3https://git.kernel.org/stable/c/403c4528e5887af3deb9838cb77a557631d1e138
https://git.kernel.org/stable/c/6a58310d5d1e5b02d0fc9b393ba540c9367bced5
https://git.kernel.org/stable/c/080bd41d6478a64edf96704fddcda52b1fd5fed7
https://git.kernel.org/stable/c/8e6fafd5a22e7a2eb216f5510db7aab54cc545c1
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.37
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.21
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.