Vulnerability identifier: #VU100186
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-667
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the acpi_cppc_processor_probe() and cpc_write() functions in drivers/acpi/cppc_acpi.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/c46d6b02588000c27b7b869388c2c0278bd0d173
https://git.kernel.org/stable/c/23039b4aaf1e82e0feea1060834d4ec34262e453
https://git.kernel.org/stable/c/0eb2b767c42fac61ab23c4063eb456baa4c2c262
https://git.kernel.org/stable/c/43b1df48d1e7000a214acd1a81b8012ca8a929c8
https://git.kernel.org/stable/c/1c10941e34c5fdc0357e46a25bd130d9cf40b925
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.