Vulnerability identifier: #VU102096
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964
https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51
https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40
https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a
https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e
https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b
https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a
https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.