Vulnerability identifier: #VU100133
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-388
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the dev_err() and rproc_del() functions in drivers/remoteproc/ti_k3_r5_remoteproc.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/87ab3af7447791d0c619610fd560bd804549e187
https://git.kernel.org/stable/c/fc71c23958931713b5e76f317b76be37189f2516
https://git.kernel.org/stable/c/afd102bde99d90ef41e043c846ea34b04433eb7b
https://git.kernel.org/stable/c/7afb5e3aa989c479979faeb18768a67889a7a9c6
https://git.kernel.org/stable/c/9ab27eb5866ccbf57715cfdba4b03d57776092fb
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.