#VU93262 NULL pointer dereference in Linux kernel


Published: 2024-06-25

Vulnerability identifier: #VU93262

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47257

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ieee802154_llsec_parse_dev_addr() function in net/ieee802154/nl802154.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185
http://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e
http://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0
http://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67
http://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627
http://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993
http://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability