Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-47395 |
CWE-ID | CWE-399 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU93467
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47395
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ieee80211_parse_tx_radiotap() function in net/mac80211/tx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/e5bb852aa2ad963074f0ad73030dbc20a30853e3
http://git.kernel.org/stable/c/ce5f372f5f084ff51c285fc27b232f15a3d00f0b
http://git.kernel.org/stable/c/76538c7b4df314bb937e44c5cb1782f37d47443c
http://git.kernel.org/stable/c/ab85997465b972d39d9747fc16311fa5773374b2
http://git.kernel.org/stable/c/1282bb00835ff79d2d9c023055d514df5b4de260
http://git.kernel.org/stable/c/997ee230e4f5285cd98445c102d9033c7ec4814b
http://git.kernel.org/stable/c/13cb6d826e0ac0d144b0d48191ff1a111d32f0c6
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.