Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47146 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU92048
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47146
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.4 - 5.13 rc5
CPE2.3https://git.kernel.org/stable/c/0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1
https://git.kernel.org/stable/c/17728616a4c85baf0edc975c60ba4e4157684d9a
https://git.kernel.org/stable/c/221142038f36d9f28b64e83e954774da4d4ccd17
https://git.kernel.org/stable/c/4b77ad9097067b31237eeeee0bf70f80849680a0
https://git.kernel.org/stable/c/37d697759958d111439080bab7e14d2b0e7b39f5
https://git.kernel.org/stable/c/beb39adb150f8f3b516ddf7c39835a9788704d23
https://git.kernel.org/stable/c/a76fb9ba545289379acf409653ad5f74417be59c
https://git.kernel.org/stable/c/020ef930b826d21c5446fdc9db80fd72a791bc21
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.235
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.193
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.271
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.271
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.124
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.