Vulnerability identifier: #VU102929
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the util_probe() function in drivers/hv/hv_util.c, within the hv_vss_init() function in drivers/hv/hv_snapshot.c, within the hv_kvp_init() function in drivers/hv/hv_kvp.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/042253c57be901bfd19f15b68267442b70f510d5
https://git.kernel.org/stable/c/07a756a49f4b4290b49ea46e089cbe6f79ff8d26
https://git.kernel.org/stable/c/3dd7a30c6d7f90afcf19e9b072f572ba524d7ec6
https://git.kernel.org/stable/c/718fe694a334be9d1a89eed22602369ac18d6583
https://git.kernel.org/stable/c/89fcec5e466b3ac9b376e0d621c71effa1a7983f
https://git.kernel.org/stable/c/d81f4e73aff9b861671df60e5100ad25cc16fbf8
https://git.kernel.org/stable/c/f091a224a2c82f1e302b1768d73bb6332f687321
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.