Vulnerability identifier: #VU102198
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-388
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/05f0a3f5477ecaa1cf46448504afe9e7c2e96fcc
https://git.kernel.org/stable/c/19630cf57233e845b6ac57c9c969a4888925467b
https://git.kernel.org/stable/c/28f8ffa945f7d7150463e15097ea73b19529d6f5
https://git.kernel.org/stable/c/4ea3e3b761e371102bb1486778e2f8dbc9e37413
https://git.kernel.org/stable/c/75e1e38e5d80d6d9011b7322698ffba3dd3db30a
https://git.kernel.org/stable/c/8f1a9a960b1107bd0e0ec3736055f5ed0e717edf
https://git.kernel.org/stable/c/ae5253313e0ea5f00c06176074592b7f493c8546
https://git.kernel.org/stable/c/bba9e38c5ad41d0a88b22a59e5b6dd3e31825118
https://git.kernel.org/stable/c/ee36db8e8203420e6d5c42eb9428920c2fc36532
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.