CVE-2021-47374
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
12/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dma-debug: prevent an error message from causing runtime problems<br />
<br />
For some drivers, that use the DMA API. This error message can be reached<br />
several millions of times per second, causing spam to the kernel&#39;s printk<br />
buffer and bringing the CPU usage up to 100% (so, it should be rate<br />
limited). However, since there is at least one driver that is in the<br />
mainline and suffers from the error condition, it is more useful to<br />
err_printk() here instead of just rate limiting the error message (in hopes<br />
that it will make it easier for other drivers that suffer from this issue<br />
to be spotted).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14.9 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



