Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47468 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU92012
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47468
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nj_release() function in drivers/isdn/hardware/mISDN/netjet.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.15 rc7
CPE2.3https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b
https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c
https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367
https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b
https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89
https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d
https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026
https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.253
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.214
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.290
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.288
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.76
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.156
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.