#VU90930 Improper error handling in Linux kernel - CVE-2021-47482


| Updated: 2025-05-14

Vulnerability identifier: #VU90930

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47482

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the batadv_tt_init() function in net/batman-adv/translation-table.c, within the batadv_nc_mesh_init() function in net/batman-adv/network-coding.c, within the batadv_mesh_init() function in net/batman-adv/main.c, within the batadv_bla_init() function in net/batman-adv/bridge_loop_avoidance.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.4, 4.4.0, 4.4.0-57, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.10, 4.4.11, 4.4.12, 4.4.13, 4.4.14, 4.4.15, 4.4.16, 4.4.17, 4.4.18, 4.4.19, 4.4.20, 4.4.21, 4.4.22, 4.4.23, 4.4.24, 4.4.25, 4.4.26, 4.4.27, 4.4.28, 4.4.29, 4.4.30, 4.4.31, 4.4.32, 4.4.33, 4.4.34, 4.4.35, 4.4.36, 4.4.37, 4.4.38, 4.4.39, 4.4.40, 4.4.41, 4.4.42, 4.4.43, 4.4.44, 4.4.45, 4.4.46, 4.4.47, 4.4.48, 4.4.49, 4.4.50, 4.4.51, 4.4.52, 4.4.53, 4.4.54, 4.4.55, 4.4.56, 4.4.57, 4.4.58, 4.4.59, 4.4.60, 4.4.61, 4.4.62, 4.4.63, 4.4.64, 4.4.65, 4.4.66, 4.4.67, 4.4.68, 4.4.69, 4.4.70, 4.4.71, 4.4.72, 4.4.73, 4.4.74, 4.4.75, 4.4.76, 4.4.77, 4.4.78, 4.4.79, 4.4.80, 4.4.81, 4.4.82, 4.4.83, 4.4.84, 4.4.85, 4.4.86, 4.4.87, 4.4.88, 4.4.89, 4.4.90, 4.4.91, 4.4.92, 4.4.93, 4.4.94, 4.4.95, 4.4.96, 4.4.97, 4.4.98, 4.4.99, 4.4.100, 4.4.101, 4.4.102, 4.4.103, 4.4.104, 4.4.105, 4.4.106, 4.4.107, 4.4.108, 4.4.109, 4.4.110, 4.4.111, 4.4.112, 4.4.113, 4.4.114, 4.4.115, 4.4.116, 4.4.117, 4.4.118, 4.4.119, 4.4.120, 4.4.121, 4.4.122, 4.4.123, 4.4.124, 4.4.125, 4.4.126, 4.4.127, 4.4.128, 4.4.129, 4.4.130, 4.4.131, 4.4.132, 4.4.133, 4.4.134, 4.4.135, 4.4.136, 4.4.137, 4.4.138, 4.4.139, 4.4.140, 4.4.141, 4.4.142, 4.4.143, 4.4.144, 4.4.145, 4.4.146, 4.4.147, 4.4.148, 4.4.149, 4.4.150, 4.4.151, 4.4.152, 4.4.153, 4.4.154, 4.4.155, 4.4.156, 4.4.157, 4.4.158, 4.4.159, 4.4.160, 4.4.161, 4.4.162, 4.4.163, 4.4.164, 4.4.165, 4.4.166, 4.4.167, 4.4.168, 4.4.169, 4.4.170, 4.4.171, 4.4.172, 4.4.173, 4.4.174, 4.4.175, 4.4.176, 4.4.177, 4.4.178, 4.4.179, 4.4.180, 4.4.181, 4.4.182, 4.4.183, 4.4.184, 4.4.185, 4.4.186, 4.4.187, 4.4.188, 4.4.189, 4.4.190, 4.4.191, 4.4.192, 4.4.193, 4.4.194, 4.4.195, 4.4.196, 4.4.197, 4.4.198, 4.4.199, 4.4.200, 4.4.201, 4.4.202, 4.4.203, 4.4.204, 4.4.205, 4.4.206, 4.4.207, 4.4.208, 4.4.209, 4.4.210, 4.4.211, 4.4.212, 4.4.213, 4.4.214, 4.4.215, 4.4.216, 4.4.217, 4.4.218, 4.4.219, 4.4.220, 4.4.221, 4.4.222, 4.4.223, 4.4.224, 4.4.225, 4.4.226, 4.4.227, 4.4.228, 4.4.229, 4.4.230, 4.4.231, 4.4.232, 4.4.233, 4.4.234, 4.4.235, 4.4.236, 4.4.237, 4.4.238, 4.4.239, 4.4.240, 4.4.241, 4.4.242, 4.4.243, 4.4.244, 4.4.245, 4.4.246, 4.4.247, 4.4.248, 4.4.249, 4.4.250, 4.4.251, 4.4.252, 4.4.253, 4.4.254, 4.4.255, 4.4.256, 4.4.257, 4.4.258, 4.4.259, 4.4.260, 4.4.261, 4.4.262, 4.4.263, 4.4.264, 4.4.265, 4.4.266, 4.4.267, 4.4.268, 4.4.269, 4.4.270, 4.4.271, 4.4.272, 4.4.273, 4.4.274, 4.4.275, 4.4.276, 4.4.277, 4.4.278, 4.4.279, 4.4.280, 4.4.281, 4.4.282, 4.4.283, 4.4.284, 4.4.285, 4.4.286, 4.4.287, 4.4.288, 4.4.289, 4.4.290, 4.4.291, 4.4.292, 4.9, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.9.7, 4.9.8, 4.9.9, 4.9.10, 4.9.11, 4.9.12, 4.9.13, 4.9.14, 4.9.15, 4.9.16, 4.9.17, 4.9.18, 4.9.19, 4.9.20, 4.9.21, 4.9.22, 4.9.23, 4.9.24, 4.9.25, 4.9.26, 4.9.27, 4.9.28, 4.9.29, 4.9.30, 4.9.31, 4.9.32, 4.9.33, 4.9.34, 4.9.35, 4.9.36, 4.9.37, 4.9.38, 4.9.39, 4.9.40, 4.9.41, 4.9.42, 4.9.43, 4.9.44, 4.9.45, 4.9.46, 4.9.47, 4.9.48, 4.9.49, 4.9.50, 4.9.51, 4.9.52, 4.9.53, 4.9.54, 4.9.55, 4.9.56, 4.9.57, 4.9.58, 4.9.59, 4.9.60, 4.9.61, 4.9.62, 4.9.63, 4.9.64, 4.9.65, 4.9.66, 4.9.67, 4.9.68, 4.9.69, 4.9.70, 4.9.71, 4.9.72, 4.9.73, 4.9.74, 4.9.75, 4.9.76, 4.9.77, 4.9.78, 4.9.79, 4.9.80, 4.9.81, 4.9.82, 4.9.83, 4.9.84, 4.9.85, 4.9.86, 4.9.87, 4.9.88, 4.9.89, 4.9.90, 4.9.91, 4.9.92, 4.9.93, 4.9.94, 4.9.95, 4.9.96, 4.9.97, 4.9.98, 4.9.99, 4.9.100, 4.9.101, 4.9.102, 4.9.103, 4.9.104, 4.9.105, 4.9.106, 4.9.107, 4.9.108, 4.9.109, 4.9.110, 4.9.111, 4.9.112, 4.9.113, 4.9.114, 4.9.115, 4.9.116, 4.9.117, 4.9.118, 4.9.119, 4.9.120, 4.9.121, 4.9.122, 4.9.123, 4.9.124, 4.9.125, 4.9.126, 4.9.127, 4.9.128, 4.9.129, 4.9.130, 4.9.131, 4.9.132, 4.9.133, 4.9.134, 4.9.135, 4.9.136, 4.9.137, 4.9.138, 4.9.139, 4.9.140, 4.9.141, 4.9.142, 4.9.143, 4.9.144, 4.9.145, 4.9.146, 4.9.147, 4.9.148, 4.9.149, 4.9.150, 4.9.151, 4.9.152, 4.9.153, 4.9.154, 4.9.155, 4.9.156, 4.9.157, 4.9.158, 4.9.159, 4.9.160, 4.9.161, 4.9.162, 4.9.163, 4.9.164, 4.9.165, 4.9.166, 4.9.167, 4.9.168, 4.9.169, 4.9.170, 4.9.171, 4.9.172, 4.9.173, 4.9.174, 4.9.175, 4.9.176, 4.9.177, 4.9.178, 4.9.179, 4.9.180, 4.9.181, 4.9.182, 4.9.183, 4.9.184, 4.9.185, 4.9.186, 4.9.187, 4.9.188, 4.9.189, 4.9.190, 4.9.191, 4.9.192, 4.9.193, 4.9.194, 4.9.195, 4.9.196, 4.9.197, 4.9.198, 4.9.199, 4.9.200, 4.9.201, 4.9.202, 4.9.203, 4.9.204, 4.9.205, 4.9.206, 4.9.207, 4.9.208, 4.9.209, 4.9.210, 4.9.210-1, 4.9.211, 4.9.212, 4.9.213, 4.9.214, 4.9.215, 4.9.216, 4.9.217, 4.9.218, 4.9.219, 4.9.220, 4.9.221, 4.9.222, 4.9.223, 4.9.224, 4.9.225, 4.9.226, 4.9.227, 4.9.228, 4.9.229, 4.9.230, 4.9.231, 4.9.232, 4.9.233, 4.9.234, 4.9.235, 4.9.236, 4.9.237, 4.9.238, 4.9.239, 4.9.240, 4.9.241, 4.9.242, 4.9.243, 4.9.244, 4.9.245, 4.9.246, 4.9.247, 4.9.248, 4.9.249, 4.9.250, 4.9.251, 4.9.252, 4.9.253, 4.9.254, 4.9.255, 4.9.256, 4.9.257, 4.9.258, 4.9.259, 4.9.260, 4.9.261, 4.9.262, 4.9.263, 4.9.264, 4.9.265, 4.9.266, 4.9.267, 4.9.268, 4.9.269, 4.9.270, 4.9.271, 4.9.272, 4.9.273, 4.9.274, 4.9.275, 4.9.276, 4.9.277, 4.9.278, 4.9.279, 4.9.280, 4.9.281, 4.9.282, 4.9.283, 4.9.284, 4.9.285, 4.9.286, 4.9.287, 4.9.288, 4.14, 4.14.0, 4.14.0 rc1, 4.14.1, 4.14.2, 4.14.3, 4.14.4, 4.14.5, 4.14.6, 4.14.7, 4.14.8, 4.14.9, 4.14.10, 4.14.11, 4.14.12, 4.14.13, 4.14.14, 4.14.15, 4.14.16, 4.14.17, 4.14.18, 4.14.19, 4.14.20, 4.14.21, 4.14.22, 4.14.23, 4.14.24, 4.14.25, 4.14.26, 4.14.27, 4.14.28, 4.14.29, 4.14.30, 4.14.31, 4.14.32, 4.14.33, 4.14.34, 4.14.35, 4.14.36, 4.14.37, 4.14.38, 4.14.39, 4.14.40, 4.14.41, 4.14.42, 4.14.43, 4.14.44, 4.14.45, 4.14.46, 4.14.47, 4.14.48, 4.14.49, 4.14.50, 4.14.51, 4.14.52, 4.14.53, 4.14.54, 4.14.55, 4.14.56, 4.14.57, 4.14.58, 4.14.59, 4.14.60, 4.14.61, 4.14.62, 4.14.63, 4.14.64, 4.14.65, 4.14.66, 4.14.67, 4.14.68, 4.14.69, 4.14.70, 4.14.71, 4.14.72, 4.14.73, 4.14.74, 4.14.75, 4.14.76, 4.14.77, 4.14.78, 4.14.79, 4.14.80, 4.14.81, 4.14.82, 4.14.83, 4.14.84, 4.14.85, 4.14.86, 4.14.87, 4.14.88, 4.14.89, 4.14.90, 4.14.91, 4.14.92, 4.14.93, 4.14.94, 4.14.95, 4.14.96, 4.14.97, 4.14.98, 4.14.99, 4.14.100, 4.14.101, 4.14.102, 4.14.103, 4.14.104, 4.14.105, 4.14.106, 4.14.107, 4.14.108, 4.14.109, 4.14.110, 4.14.111, 4.14.112, 4.14.113, 4.14.114, 4.14.115, 4.14.116, 4.14.117, 4.14.118, 4.14.119, 4.14.120, 4.14.121, 4.14.122, 4.14.123, 4.14.124, 4.14.125, 4.14.126, 4.14.127, 4.14.128, 4.14.129, 4.14.130, 4.14.131, 4.14.132, 4.14.133, 4.14.134, 4.14.135, 4.14.136, 4.14.137, 4.14.138, 4.14.139, 4.14.140, 4.14.141, 4.14.142, 4.14.143, 4.14.144, 4.14.145, 4.14.146, 4.14.147, 4.14.148, 4.14.149, 4.14.150, 4.14.151, 4.14.152, 4.14.153, 4.14.154, 4.14.155, 4.14.156, 4.14.157, 4.14.158, 4.14.159, 4.14.160, 4.14.161, 4.14.162, 4.14.163, 4.14.164, 4.14.165, 4.14.166, 4.14.167, 4.14.168, 4.14.169, 4.14.170, 4.14.171, 4.14.172, 4.14.173, 4.14.174, 4.14.175, 4.14.176, 4.14.177, 4.14.178, 4.14.179, 4.14.180, 4.14.181, 4.14.182, 4.14.183, 4.14.184, 4.14.185, 4.14.186, 4.14.187, 4.14.188, 4.14.189, 4.14.190, 4.14.191, 4.14.192, 4.14.193, 4.14.194, 4.14.195, 4.14.196, 4.14.197, 4.14.198, 4.14.199, 4.14.200, 4.14.201, 4.14.202, 4.14.203, 4.14.204, 4.14.205, 4.14.206, 4.14.207, 4.14.208, 4.14.209, 4.14.210, 4.14.211, 4.14.212, 4.14.213, 4.14.214, 4.14.215, 4.14.216, 4.14.217, 4.14.218, 4.14.219, 4.14.220, 4.14.221, 4.14.222, 4.14.223, 4.14.224, 4.14.225, 4.14.226, 4.14.227, 4.14.228, 4.14.229, 4.14.230, 4.14.231, 4.14.232, 4.14.233, 4.14.234, 4.14.235, 4.14.236, 4.14.237, 4.14.238, 4.14.239, 4.14.240, 4.14.241, 4.14.242, 4.14.243, 4.14.244, 4.14.245, 4.14.246, 4.14.247, 4.14.248, 4.14.249, 4.14.250, 4.14.251, 4.14.252, 4.14.253, 4.19, 4.19.1, 4.19.2, 4.19.3, 4.19.4, 4.19.5, 4.19.6, 4.19.7, 4.19.8, 4.19.9, 4.19.10, 4.19.11, 4.19.12, 4.19.13, 4.19.14, 4.19.15, 4.19.16, 4.19.17, 4.19.18, 4.19.19, 4.19.20, 4.19.21, 4.19.22, 4.19.23, 4.19.24, 4.19.25, 4.19.26, 4.19.27, 4.19.28, 4.19.29, 4.19.30, 4.19.31, 4.19.32, 4.19.33, 4.19.34, 4.19.35, 4.19.36, 4.19.37, 4.19.38, 4.19.39, 4.19.40, 4.19.41, 4.19.42, 4.19.43, 4.19.44, 4.19.45, 4.19.46, 4.19.47, 4.19.48, 4.19.49, 4.19.50, 4.19.51, 4.19.52, 4.19.53, 4.19.54, 4.19.55, 4.19.56, 4.19.57, 4.19.58, 4.19.59, 4.19.60, 4.19.61, 4.19.62, 4.19.63, 4.19.64, 4.19.65, 4.19.66, 4.19.67, 4.19.68, 4.19.69, 4.19.70, 4.19.71, 4.19.72, 4.19.73, 4.19.74, 4.19.75, 4.19.76, 4.19.77, 4.19.78, 4.19.79, 4.19.80, 4.19.81, 4.19.82, 4.19.83, 4.19.84, 4.19.85, 4.19.86, 4.19.87, 4.19.88, 4.19.89, 4.19.90, 4.19.91, 4.19.92, 4.19.93, 4.19.94, 4.19.95, 4.19.96, 4.19.97, 4.19.98, 4.19.99, 4.19.100, 4.19.101, 4.19.102, 4.19.103, 4.19.104, 4.19.105, 4.19.106, 4.19.107, 4.19.108, 4.19.109, 4.19.110, 4.19.111, 4.19.112, 4.19.113, 4.19.114, 4.19.115, 4.19.116, 4.19.117, 4.19.118, 4.19.118-2, 4.19.119, 4.19.120, 4.19.121, 4.19.122, 4.19.123, 4.19.124, 4.19.125, 4.19.126, 4.19.127, 4.19.128, 4.19.129, 4.19.130, 4.19.131, 4.19.132, 4.19.133, 4.19.134, 4.19.135, 4.19.136, 4.19.137, 4.19.138, 4.19.139, 4.19.140, 4.19.141, 4.19.142, 4.19.143, 4.19.144, 4.19.145, 4.19.146, 4.19.147, 4.19.148, 4.19.149, 4.19.150, 4.19.151, 4.19.152, 4.19.153, 4.19.154, 4.19.155, 4.19.156, 4.19.157, 4.19.158, 4.19.159, 4.19.160, 4.19.161, 4.19.162, 4.19.163, 4.19.164, 4.19.165, 4.19.166, 4.19.167, 4.19.168, 4.19.169, 4.19.170, 4.19.171, 4.19.172, 4.19.173, 4.19.174, 4.19.175, 4.19.176, 4.19.177, 4.19.178, 4.19.179, 4.19.180, 4.19.181, 4.19.182, 4.19.183, 4.19.184, 4.19.185, 4.19.186, 4.19.187, 4.19.188, 4.19.189, 4.19.190, 4.19.191, 4.19.192, 4.19.193, 4.19.194, 4.19.195, 4.19.196, 4.19.197, 4.19.198, 4.19.199, 4.19.200, 4.19.201, 4.19.202, 4.19.203, 4.19.204, 4.19.205, 4.19.206, 4.19.207, 4.19.208, 4.19.209, 4.19.210, 4.19.211, 4.19.212, 4.19.213, 4.19.214, 5.4, 5.4.0, 5.4.0 rc6, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.4.7, 5.4.8, 5.4.9, 5.4.10, 5.4.11, 5.4.12, 5.4.13, 5.4.14, 5.4.15, 5.4.16, 5.4.17, 5.4.18, 5.4.19, 5.4.20, 5.4.21, 5.4.22, 5.4.23, 5.4.24, 5.4.25, 5.4.26, 5.4.27, 5.4.28, 5.4.29, 5.4.30, 5.4.31, 5.4.32, 5.4.33, 5.4.34, 5.4.35, 5.4.36, 5.4.37, 5.4.38, 5.4.39, 5.4.40, 5.4.41, 5.4.42, 5.4.43, 5.4.44, 5.4.45, 5.4.46, 5.4.47, 5.4.48, 5.4.49, 5.4.50, 5.4.51, 5.4.52, 5.4.53, 5.4.54, 5.4.55, 5.4.56, 5.4.57, 5.4.58, 5.4.59, 5.4.60, 5.4.61, 5.4.62, 5.4.63, 5.4.64, 5.4.65, 5.4.66, 5.4.67, 5.4.68, 5.4.69, 5.4.70, 5.4.71, 5.4.72, 5.4.73, 5.4.74, 5.4.75, 5.4.76, 5.4.77, 5.4.78, 5.4.79, 5.4.80, 5.4.81, 5.4.82, 5.4.83, 5.4.84, 5.4.85, 5.4.86, 5.4.87, 5.4.88, 5.4.89, 5.4.90, 5.4.91, 5.4.92, 5.4.93, 5.4.94, 5.4.95, 5.4.96, 5.4.97, 5.4.98, 5.4.99, 5.4.100, 5.4.101, 5.4.102, 5.4.103, 5.4.104, 5.4.105, 5.4.106, 5.4.107, 5.4.108, 5.4.109, 5.4.110, 5.4.111, 5.4.112, 5.4.113, 5.4.114, 5.4.115, 5.4.116, 5.4.117, 5.4.118, 5.4.119, 5.4.120, 5.4.121, 5.4.122, 5.4.123, 5.4.124, 5.4.125, 5.4.126, 5.4.127, 5.4.128, 5.4.129, 5.4.130, 5.4.131, 5.4.132, 5.4.133, 5.4.134, 5.4.135, 5.4.136, 5.4.137, 5.4.138, 5.4.139, 5.4.140, 5.4.141, 5.4.142, 5.4.143, 5.4.144, 5.4.145, 5.4.146, 5.4.147, 5.4.148, 5.4.149, 5.4.150, 5.4.151, 5.4.152, 5.4.153, 5.4.154, 5.4.155, 5.4.156, 5.10, 5.10 rc1, 5.10 rc2, 5.10 rc3, 5.10 rc4, 5.10 rc5, 5.10 rc7, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5, 5.10.6, 5.10.7, 5.10.8, 5.10.9, 5.10.10, 5.10.11, 5.10.12, 5.10.13, 5.10.14, 5.10.15, 5.10.16, 5.10.17, 5.10.18, 5.10.19, 5.10.20, 5.10.21, 5.10.22, 5.10.23, 5.10.24, 5.10.25, 5.10.26, 5.10.27, 5.10.28, 5.10.29, 5.10.30, 5.10.31, 5.10.32, 5.10.33, 5.10.34, 5.10.35, 5.10.36, 5.10.37, 5.10.38, 5.10.39, 5.10.40, 5.10.41, 5.10.42, 5.10.43, 5.10.44, 5.10.45, 5.10.46, 5.10.47, 5.10.48, 5.10.49, 5.10.50, 5.10.51, 5.10.52, 5.10.53, 5.10.54, 5.10.55, 5.10.56, 5.10.57, 5.10.58, 5.10.59, 5.10.60, 5.10.61, 5.10.62, 5.10.63, 5.10.64, 5.10.65, 5.10.66, 5.10.67, 5.10.68, 5.10.69, 5.10.70, 5.10.71, 5.10.72, 5.10.73, 5.10.74, 5.10.75, 5.10.76, 5.14, 5.14 rc1, 5.14 rc2, 5.14 rc3, 5.14 rc4, 5.14 rc7, 5.14.0-49.el9, 5.14.1, 5.14.2, 5.14.3, 5.14.4, 5.14.5, 5.14.6, 5.14.7, 5.14.8, 5.14.9, 5.14.10, 5.14.11, 5.14.12, 5.14.13, 5.14.14, 5.14.15, 5.14.15-100.fc33, 5.14.15-200.fc34, 5.14.15-300.fc35, 5.15 rc1, 5.15 rc2, 5.15 rc3, 5.15 rc4, 5.15 rc5, 5.15 rc6, 5.15 rc7


External links
https://git.kernel.org/stable/c/0c6b199f09be489c48622537a550787fc80aea73
https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20
https://git.kernel.org/stable/c/e50f957652190b5a88a8ebce7e5ab14ebd0d3f00
https://git.kernel.org/stable/c/fbf150b16a3635634b7dfb7f229d8fcd643c6c51
https://git.kernel.org/stable/c/6422e8471890273994fe8cc6d452b0dcd2c9483e
https://git.kernel.org/stable/c/b0a2cd38553c77928ef1646ed1518486b1e70ae8
https://git.kernel.org/stable/c/a8f7359259dd5923adc6129284fdad12fc5db347
https://git.kernel.org/stable/c/6f68cd634856f8ca93bafd623ba5357e0f648c68
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.254
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.215
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.293
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.289
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.77
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.157


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability