Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47207 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90583
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47207
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the snd_gf1_dma_interrupt() function in sound/isa/gus/gus_dma.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be
http://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc
http://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c
http://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315
http://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc
http://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f
http://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3
http://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.