#VU90016 Memory leak in Linux kernel


Vulnerability identifier: #VU90016

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47121

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cfusbl_create() and cfusbl_device_notify() functions in net/caif/caif_usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294
http://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141
http://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76
http://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f
http://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886
http://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051
http://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1
http://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability