CVE-2021-47374

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
12/05/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dma-debug: prevent an error message from causing runtime problems<br /> <br /> For some drivers, that use the DMA API. This error message can be reached<br /> several millions of times per second, causing spam to the kernel&amp;#39;s printk<br /> buffer and bringing the CPU usage up to 100% (so, it should be rate<br /> limited). However, since there is at least one driver that is in the<br /> mainline and suffers from the error condition, it is more useful to<br /> err_printk() here instead of just rate limiting the error message (in hopes<br /> that it will make it easier for other drivers that suffer from this issue<br /> to be spotted).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.14.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*