Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47401 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU91624
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47401
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ipoctal_inst_slot() and __ipoctal_remove() functions in drivers/ipack/devices/ipoctal.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.15 rc7
CPE2.3https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380
https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0
https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7
https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d
https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7
https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426
https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575
https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.249
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.209
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.286
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.285
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.71
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.151
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.