Out-of-bounds read in Linux kernel tty vt driver



| Updated: 2025-05-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-47383
CWE-ID CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU91390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47383

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vc_do_resize() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.4 - 5.15 rc7

CPE2.3 External links

https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f
https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b
https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9
https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325
https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a
https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560
https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b
https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.249
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.209
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.286
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.285
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.71
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.151


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###