NULL pointer dereference in Linux kernel ieee802154



Published: 2024-06-25
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-47257
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU93262

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47257

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ieee802154_llsec_parse_dev_addr() function in net/ieee802154/nl802154.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185
http://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e
http://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0
http://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67
http://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627
http://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993
http://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###