#VU89959 Memory leak in Linux kernel - CVE-2021-47320


| Updated: 2025-05-14

Vulnerability identifier: #VU89959

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47320

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfs3_proc_create() and nfs3_proc_mknod() functions in fs/nfs/nfs3proc.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.4, 4.4.0, 4.4.0-57, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.10, 4.4.11, 4.4.12, 4.4.13, 4.4.14, 4.4.15, 4.4.16, 4.4.17, 4.4.18, 4.4.19, 4.4.20, 4.4.21, 4.4.22, 4.4.23, 4.4.24, 4.4.25, 4.4.26, 4.4.27, 4.4.28, 4.4.29, 4.4.30, 4.4.31, 4.4.32, 4.4.33, 4.4.34, 4.4.35, 4.4.36, 4.4.37, 4.4.38, 4.4.39, 4.4.40, 4.4.41, 4.4.42, 4.4.43, 4.4.44, 4.4.45, 4.4.46, 4.4.47, 4.4.48, 4.4.49, 4.4.50, 4.4.51, 4.4.52, 4.4.53, 4.4.54, 4.4.55, 4.4.56, 4.4.57, 4.4.58, 4.4.59, 4.4.60, 4.4.61, 4.4.62, 4.4.63, 4.4.64, 4.4.65, 4.4.66, 4.4.67, 4.4.68, 4.4.69, 4.4.70, 4.4.71, 4.4.72, 4.4.73, 4.4.74, 4.4.75, 4.4.76, 4.4.77, 4.4.78, 4.4.79, 4.4.80, 4.4.81, 4.4.82, 4.4.83, 4.4.84, 4.4.85, 4.4.86, 4.4.87, 4.4.88, 4.4.89, 4.4.90, 4.4.91, 4.4.92, 4.4.93, 4.4.94, 4.4.95, 4.4.96, 4.4.97, 4.4.98, 4.4.99, 4.4.100, 4.4.101, 4.4.102, 4.4.103, 4.4.104, 4.4.105, 4.4.106, 4.4.107, 4.4.108, 4.4.109, 4.4.110, 4.4.111, 4.4.112, 4.4.113, 4.4.114, 4.4.115, 4.4.116, 4.4.117, 4.4.118, 4.4.119, 4.4.120, 4.4.121, 4.4.122, 4.4.123, 4.4.124, 4.4.125, 4.4.126, 4.4.127, 4.4.128, 4.4.129, 4.4.130, 4.4.131, 4.4.132, 4.4.133, 4.4.134, 4.4.135, 4.4.136, 4.4.137, 4.4.138, 4.4.139, 4.4.140, 4.4.141, 4.4.142, 4.4.143, 4.4.144, 4.4.145, 4.4.146, 4.4.147, 4.4.148, 4.4.149, 4.4.150, 4.4.151, 4.4.152, 4.4.153, 4.4.154, 4.4.155, 4.4.156, 4.4.157, 4.4.158, 4.4.159, 4.4.160, 4.4.161, 4.4.162, 4.4.163, 4.4.164, 4.4.165, 4.4.166, 4.4.167, 4.4.168, 4.4.169, 4.4.170, 4.4.171, 4.4.172, 4.4.173, 4.4.174, 4.4.175, 4.4.176, 4.4.177, 4.4.178, 4.4.179, 4.4.180, 4.4.181, 4.4.182, 4.4.183, 4.4.184, 4.4.185, 4.4.186, 4.4.187, 4.4.188, 4.4.189, 4.4.190, 4.4.191, 4.4.192, 4.4.193, 4.4.194, 4.4.195, 4.4.196, 4.4.197, 4.4.198, 4.4.199, 4.4.200, 4.4.201, 4.4.202, 4.4.203, 4.4.204, 4.4.205, 4.4.206, 4.4.207, 4.4.208, 4.4.209, 4.4.210, 4.4.211, 4.4.212, 4.4.213, 4.4.214, 4.4.215, 4.4.216, 4.4.217, 4.4.218, 4.4.219, 4.4.220, 4.4.221, 4.4.222, 4.4.223, 4.4.224, 4.4.225, 4.4.226, 4.4.227, 4.4.228, 4.4.229, 4.4.230, 4.4.231, 4.4.232, 4.4.233, 4.4.234, 4.4.235, 4.4.236, 4.4.237, 4.4.238, 4.4.239, 4.4.240, 4.4.241, 4.4.242, 4.4.243, 4.4.244, 4.4.245, 4.4.246, 4.4.247, 4.4.248, 4.4.249, 4.4.250, 4.4.251, 4.4.252, 4.4.253, 4.4.254, 4.4.255, 4.4.256, 4.4.257, 4.4.258, 4.4.259, 4.4.260, 4.4.261, 4.4.262, 4.4.263, 4.4.264, 4.4.265, 4.4.266, 4.4.267, 4.4.268, 4.4.269, 4.4.270, 4.4.271, 4.4.272, 4.4.273, 4.4.274, 4.4.275, 4.9, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.9.7, 4.9.8, 4.9.9, 4.9.10, 4.9.11, 4.9.12, 4.9.13, 4.9.14, 4.9.15, 4.9.16, 4.9.17, 4.9.18, 4.9.19, 4.9.20, 4.9.21, 4.9.22, 4.9.23, 4.9.24, 4.9.25, 4.9.26, 4.9.27, 4.9.28, 4.9.29, 4.9.30, 4.9.31, 4.9.32, 4.9.33, 4.9.34, 4.9.35, 4.9.36, 4.9.37, 4.9.38, 4.9.39, 4.9.40, 4.9.41, 4.9.42, 4.9.43, 4.9.44, 4.9.45, 4.9.46, 4.9.47, 4.9.48, 4.9.49, 4.9.50, 4.9.51, 4.9.52, 4.9.53, 4.9.54, 4.9.55, 4.9.56, 4.9.57, 4.9.58, 4.9.59, 4.9.60, 4.9.61, 4.9.62, 4.9.63, 4.9.64, 4.9.65, 4.9.66, 4.9.67, 4.9.68, 4.9.69, 4.9.70, 4.9.71, 4.9.72, 4.9.73, 4.9.74, 4.9.75, 4.9.76, 4.9.77, 4.9.78, 4.9.79, 4.9.80, 4.9.81, 4.9.82, 4.9.83, 4.9.84, 4.9.85, 4.9.86, 4.9.87, 4.9.88, 4.9.89, 4.9.90, 4.9.91, 4.9.92, 4.9.93, 4.9.94, 4.9.95, 4.9.96, 4.9.97, 4.9.98, 4.9.99, 4.9.100, 4.9.101, 4.9.102, 4.9.103, 4.9.104, 4.9.105, 4.9.106, 4.9.107, 4.9.108, 4.9.109, 4.9.110, 4.9.111, 4.9.112, 4.9.113, 4.9.114, 4.9.115, 4.9.116, 4.9.117, 4.9.118, 4.9.119, 4.9.120, 4.9.121, 4.9.122, 4.9.123, 4.9.124, 4.9.125, 4.9.126, 4.9.127, 4.9.128, 4.9.129, 4.9.130, 4.9.131, 4.9.132, 4.9.133, 4.9.134, 4.9.135, 4.9.136, 4.9.137, 4.9.138, 4.9.139, 4.9.140, 4.9.141, 4.9.142, 4.9.143, 4.9.144, 4.9.145, 4.9.146, 4.9.147, 4.9.148, 4.9.149, 4.9.150, 4.9.151, 4.9.152, 4.9.153, 4.9.154, 4.9.155, 4.9.156, 4.9.157, 4.9.158, 4.9.159, 4.9.160, 4.9.161, 4.9.162, 4.9.163, 4.9.164, 4.9.165, 4.9.166, 4.9.167, 4.9.168, 4.9.169, 4.9.170, 4.9.171, 4.9.172, 4.9.173, 4.9.174, 4.9.175, 4.9.176, 4.9.177, 4.9.178, 4.9.179, 4.9.180, 4.9.181, 4.9.182, 4.9.183, 4.9.184, 4.9.185, 4.9.186, 4.9.187, 4.9.188, 4.9.189, 4.9.190, 4.9.191, 4.9.192, 4.9.193, 4.9.194, 4.9.195, 4.9.196, 4.9.197, 4.9.198, 4.9.199, 4.9.200, 4.9.201, 4.9.202, 4.9.203, 4.9.204, 4.9.205, 4.9.206, 4.9.207, 4.9.208, 4.9.209, 4.9.210, 4.9.210-1, 4.9.211, 4.9.212, 4.9.213, 4.9.214, 4.9.215, 4.9.216, 4.9.217, 4.9.218, 4.9.219, 4.9.220, 4.9.221, 4.9.222, 4.9.223, 4.9.224, 4.9.225, 4.9.226, 4.9.227, 4.9.228, 4.9.229, 4.9.230, 4.9.231, 4.9.232, 4.9.233, 4.9.234, 4.9.235, 4.9.236, 4.9.237, 4.9.238, 4.9.239, 4.9.240, 4.9.241, 4.9.242, 4.9.243, 4.9.244, 4.9.245, 4.9.246, 4.9.247, 4.9.248, 4.9.249, 4.9.250, 4.9.251, 4.9.252, 4.9.253, 4.9.254, 4.9.255, 4.9.256, 4.9.257, 4.9.258, 4.9.259, 4.9.260, 4.9.261, 4.9.262, 4.9.263, 4.9.264, 4.9.265, 4.9.266, 4.9.267, 4.9.268, 4.9.269, 4.9.270, 4.9.271, 4.9.272, 4.9.273, 4.9.274, 4.9.275, 4.14, 4.14.0, 4.14.0 rc1, 4.14.1, 4.14.2, 4.14.3, 4.14.4, 4.14.5, 4.14.6, 4.14.7, 4.14.8, 4.14.9, 4.14.10, 4.14.11, 4.14.12, 4.14.13, 4.14.14, 4.14.15, 4.14.16, 4.14.17, 4.14.18, 4.14.19, 4.14.20, 4.14.21, 4.14.22, 4.14.23, 4.14.24, 4.14.25, 4.14.26, 4.14.27, 4.14.28, 4.14.29, 4.14.30, 4.14.31, 4.14.32, 4.14.33, 4.14.34, 4.14.35, 4.14.36, 4.14.37, 4.14.38, 4.14.39, 4.14.40, 4.14.41, 4.14.42, 4.14.43, 4.14.44, 4.14.45, 4.14.46, 4.14.47, 4.14.48, 4.14.49, 4.14.50, 4.14.51, 4.14.52, 4.14.53, 4.14.54, 4.14.55, 4.14.56, 4.14.57, 4.14.58, 4.14.59, 4.14.60, 4.14.61, 4.14.62, 4.14.63, 4.14.64, 4.14.65, 4.14.66, 4.14.67, 4.14.68, 4.14.69, 4.14.70, 4.14.71, 4.14.72, 4.14.73, 4.14.74, 4.14.75, 4.14.76, 4.14.77, 4.14.78, 4.14.79, 4.14.80, 4.14.81, 4.14.82, 4.14.83, 4.14.84, 4.14.85, 4.14.86, 4.14.87, 4.14.88, 4.14.89, 4.14.90, 4.14.91, 4.14.92, 4.14.93, 4.14.94, 4.14.95, 4.14.96, 4.14.97, 4.14.98, 4.14.99, 4.14.100, 4.14.101, 4.14.102, 4.14.103, 4.14.104, 4.14.105, 4.14.106, 4.14.107, 4.14.108, 4.14.109, 4.14.110, 4.14.111, 4.14.112, 4.14.113, 4.14.114, 4.14.115, 4.14.116, 4.14.117, 4.14.118, 4.14.119, 4.14.120, 4.14.121, 4.14.122, 4.14.123, 4.14.124, 4.14.125, 4.14.126, 4.14.127, 4.14.128, 4.14.129, 4.14.130, 4.14.131, 4.14.132, 4.14.133, 4.14.134, 4.14.135, 4.14.136, 4.14.137, 4.14.138, 4.14.139, 4.14.140, 4.14.141, 4.14.142, 4.14.143, 4.14.144, 4.14.145, 4.14.146, 4.14.147, 4.14.148, 4.14.149, 4.14.150, 4.14.151, 4.14.152, 4.14.153, 4.14.154, 4.14.155, 4.14.156, 4.14.157, 4.14.158, 4.14.159, 4.14.160, 4.14.161, 4.14.162, 4.14.163, 4.14.164, 4.14.165, 4.14.166, 4.14.167, 4.14.168, 4.14.169, 4.14.170, 4.14.171, 4.14.172, 4.14.173, 4.14.174, 4.14.175, 4.14.176, 4.14.177, 4.14.178, 4.14.179, 4.14.180, 4.14.181, 4.14.182, 4.14.183, 4.14.184, 4.14.185, 4.14.186, 4.14.187, 4.14.188, 4.14.189, 4.14.190, 4.14.191, 4.14.192, 4.14.193, 4.14.194, 4.14.195, 4.14.196, 4.14.197, 4.14.198, 4.14.199, 4.14.200, 4.14.201, 4.14.202, 4.14.203, 4.14.204, 4.14.205, 4.14.206, 4.14.207, 4.14.208, 4.14.209, 4.14.210, 4.14.211, 4.14.212, 4.14.213, 4.14.214, 4.14.215, 4.14.216, 4.14.217, 4.14.218, 4.14.219, 4.14.220, 4.14.221, 4.14.222, 4.14.223, 4.14.224, 4.14.225, 4.14.226, 4.14.227, 4.14.228, 4.14.229, 4.14.230, 4.14.231, 4.14.232, 4.14.233, 4.14.234, 4.14.235, 4.14.236, 4.14.237, 4.14.238, 4.14.239, 4.19, 4.19.1, 4.19.2, 4.19.3, 4.19.4, 4.19.5, 4.19.6, 4.19.7, 4.19.8, 4.19.9, 4.19.10, 4.19.11, 4.19.12, 4.19.13, 4.19.14, 4.19.15, 4.19.16, 4.19.17, 4.19.18, 4.19.19, 4.19.20, 4.19.21, 4.19.22, 4.19.23, 4.19.24, 4.19.25, 4.19.26, 4.19.27, 4.19.28, 4.19.29, 4.19.30, 4.19.31, 4.19.32, 4.19.33, 4.19.34, 4.19.35, 4.19.36, 4.19.37, 4.19.38, 4.19.39, 4.19.40, 4.19.41, 4.19.42, 4.19.43, 4.19.44, 4.19.45, 4.19.46, 4.19.47, 4.19.48, 4.19.49, 4.19.50, 4.19.51, 4.19.52, 4.19.53, 4.19.54, 4.19.55, 4.19.56, 4.19.57, 4.19.58, 4.19.59, 4.19.60, 4.19.61, 4.19.62, 4.19.63, 4.19.64, 4.19.65, 4.19.66, 4.19.67, 4.19.68, 4.19.69, 4.19.70, 4.19.71, 4.19.72, 4.19.73, 4.19.74, 4.19.75, 4.19.76, 4.19.77, 4.19.78, 4.19.79, 4.19.80, 4.19.81, 4.19.82, 4.19.83, 4.19.84, 4.19.85, 4.19.86, 4.19.87, 4.19.88, 4.19.89, 4.19.90, 4.19.91, 4.19.92, 4.19.93, 4.19.94, 4.19.95, 4.19.96, 4.19.97, 4.19.98, 4.19.99, 4.19.100, 4.19.101, 4.19.102, 4.19.103, 4.19.104, 4.19.105, 4.19.106, 4.19.107, 4.19.108, 4.19.109, 4.19.110, 4.19.111, 4.19.112, 4.19.113, 4.19.114, 4.19.115, 4.19.116, 4.19.117, 4.19.118, 4.19.118-2, 4.19.119, 4.19.120, 4.19.121, 4.19.122, 4.19.123, 4.19.124, 4.19.125, 4.19.126, 4.19.127, 4.19.128, 4.19.129, 4.19.130, 4.19.131, 4.19.132, 4.19.133, 4.19.134, 4.19.135, 4.19.136, 4.19.137, 4.19.138, 4.19.139, 4.19.140, 4.19.141, 4.19.142, 4.19.143, 4.19.144, 4.19.145, 4.19.146, 4.19.147, 4.19.148, 4.19.149, 4.19.150, 4.19.151, 4.19.152, 4.19.153, 4.19.154, 4.19.155, 4.19.156, 4.19.157, 4.19.158, 4.19.159, 4.19.160, 4.19.161, 4.19.162, 4.19.163, 4.19.164, 4.19.165, 4.19.166, 4.19.167, 4.19.168, 4.19.169, 4.19.170, 4.19.171, 4.19.172, 4.19.173, 4.19.174, 4.19.175, 4.19.176, 4.19.177, 4.19.178, 4.19.179, 4.19.180, 4.19.181, 4.19.182, 4.19.183, 4.19.184, 4.19.185, 4.19.186, 4.19.187, 4.19.188, 4.19.189, 4.19.190, 4.19.191, 4.19.192, 4.19.193, 4.19.194, 4.19.195, 4.19.196, 4.19.197, 5.4, 5.4.0, 5.4.0 rc6, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.4.7, 5.4.8, 5.4.9, 5.4.10, 5.4.11, 5.4.12, 5.4.13, 5.4.14, 5.4.15, 5.4.16, 5.4.17, 5.4.18, 5.4.19, 5.4.20, 5.4.21, 5.4.22, 5.4.23, 5.4.24, 5.4.25, 5.4.26, 5.4.27, 5.4.28, 5.4.29, 5.4.30, 5.4.31, 5.4.32, 5.4.33, 5.4.34, 5.4.35, 5.4.36, 5.4.37, 5.4.38, 5.4.39, 5.4.40, 5.4.41, 5.4.42, 5.4.43, 5.4.44, 5.4.45, 5.4.46, 5.4.47, 5.4.48, 5.4.49, 5.4.50, 5.4.51, 5.4.52, 5.4.53, 5.4.54, 5.4.55, 5.4.56, 5.4.57, 5.4.58, 5.4.59, 5.4.60, 5.4.61, 5.4.62, 5.4.63, 5.4.64, 5.4.65, 5.4.66, 5.4.67, 5.4.68, 5.4.69, 5.4.70, 5.4.71, 5.4.72, 5.4.73, 5.4.74, 5.4.75, 5.4.76, 5.4.77, 5.4.78, 5.4.79, 5.4.80, 5.4.81, 5.4.82, 5.4.83, 5.4.84, 5.4.85, 5.4.86, 5.4.87, 5.4.88, 5.4.89, 5.4.90, 5.4.91, 5.4.92, 5.4.93, 5.4.94, 5.4.95, 5.4.96, 5.4.97, 5.4.98, 5.4.99, 5.4.100, 5.4.101, 5.4.102, 5.4.103, 5.4.104, 5.4.105, 5.4.106, 5.4.107, 5.4.108, 5.4.109, 5.4.110, 5.4.111, 5.4.112, 5.4.113, 5.4.114, 5.4.115, 5.4.116, 5.4.117, 5.4.118, 5.4.119, 5.4.120, 5.4.121, 5.4.122, 5.4.123, 5.4.124, 5.4.125, 5.4.126, 5.4.127, 5.4.128, 5.4.129, 5.4.130, 5.4.131, 5.4.132, 5.4.133, 5.10, 5.10 rc1, 5.10 rc2, 5.10 rc3, 5.10 rc4, 5.10 rc5, 5.10 rc7, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5, 5.10.6, 5.10.7, 5.10.8, 5.10.9, 5.10.10, 5.10.11, 5.10.12, 5.10.13, 5.10.14, 5.10.15, 5.10.16, 5.10.17, 5.10.18, 5.10.19, 5.10.20, 5.10.21, 5.10.22, 5.10.23, 5.10.24, 5.10.25, 5.10.26, 5.10.27, 5.10.28, 5.10.29, 5.10.30, 5.10.31, 5.10.32, 5.10.33, 5.10.34, 5.10.35, 5.10.36, 5.10.37, 5.10.38, 5.10.39, 5.10.40, 5.10.41, 5.10.42, 5.10.43, 5.10.44, 5.10.45, 5.10.46, 5.10.47, 5.10.48, 5.10.49, 5.10.50, 5.10.51, 5.12, 5.12 rc1, 5.12 rc2, 5.12 rc3, 5.12 rc4, 5.12 rc6, 5.12 rc8, 5.12.1, 5.12.2, 5.12.3, 5.12.4, 5.12.5, 5.12.6, 5.12.7, 5.12.8, 5.12.9, 5.12.10, 5.12.11, 5.12.12, 5.12.13, 5.12.14, 5.12.15, 5.12.16, 5.12.17, 5.12.18, 5.13, 5.13 rc1, 5.13 rc4, 5.13 rc5, 5.13.1, 5.13.2, 5.13.3, 5.14 rc1, 5.14 rc2, 5.14 rc3, 5.14 rc4, 5.14 rc7


External links
https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.240
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.198
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.276
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.276
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.19
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.134


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability