Vulnerability identifier: #VU102280
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c
https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3
https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773
https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3
https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83
https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166
https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.