Improper locking in Linux kernel ipv6



| Updated: 2025-05-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-47146
CWE-ID CWE-667
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper locking

EUVDB-ID: #VU92048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47146

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.4 - 5.13 rc5

CPE2.3 External links

https://git.kernel.org/stable/c/0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1
https://git.kernel.org/stable/c/17728616a4c85baf0edc975c60ba4e4157684d9a
https://git.kernel.org/stable/c/221142038f36d9f28b64e83e954774da4d4ccd17
https://git.kernel.org/stable/c/4b77ad9097067b31237eeeee0bf70f80849680a0
https://git.kernel.org/stable/c/37d697759958d111439080bab7e14d2b0e7b39f5
https://git.kernel.org/stable/c/beb39adb150f8f3b516ddf7c39835a9788704d23
https://git.kernel.org/stable/c/a76fb9ba545289379acf409653ad5f74417be59c
https://git.kernel.org/stable/c/020ef930b826d21c5446fdc9db80fd72a791bc21
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.235
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.271
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.124


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###