Memory leak in Linux kernel - CVE-2021-47236
Published: June 10, 2024 / Updated: May 13, 2025
Vulnerability identifier: #VU91632
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-47236
CWE-ID: CWE-401
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the eem_tx_fixup() function in drivers/net/usb/cdc_eem.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65
- https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df
- https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e
- https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d
- https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f
- https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02
- https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88
- https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.238
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.196
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.274
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.274
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.46
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.128