Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47483 |
CWE-ID | CWE-415 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90920
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47483
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the regcache_rbtree_insert_to_block() function in drivers/base/regmap/regcache-rbtree.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
http://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
http://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
http://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
http://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
http://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
http://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
http://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.