Vulnerability identifier: #VU102231
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vector_device_release() function in arch/um/drivers/vector_kern.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/12f52e373d63f008ee386f371bdd82a3a3779199
https://git.kernel.org/stable/c/35f8f72b45791a6a71b81140c59d02a6183b6f3b
https://git.kernel.org/stable/c/376c7f0beb8f6f3800fc3013ef2f422d0cbfbf92
https://git.kernel.org/stable/c/51b39d741970742a5c41136241a9c48ac607cf82
https://git.kernel.org/stable/c/8204dd589c4f25a7618eece5da3f0871e02af8ae
https://git.kernel.org/stable/c/8ed7793f6f589b4e1f0b38f8448578d2a48f9c82
https://git.kernel.org/stable/c/bef9a2835011668c221851a7572b6c8433087f85
https://git.kernel.org/stable/c/dc5251b1af5c9a0749322bf58bd5aa673f545fe2
https://git.kernel.org/stable/c/e9d36f7e71a907ec507f84ee5d60a622c345cac4
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.