Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47383 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU91390
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47383
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vc_do_resize() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.15 rc7
CPE2.3https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f
https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b
https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9
https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325
https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a
https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560
https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b
https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.249
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.209
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.286
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.285
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.71
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.151
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.