Vulnerability identifier: #VU103661
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nft_pipapo_get(), nft_pipapo_activate() and nft_pipapo_remove() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/156369a702c33ad5434a19c3a689bfb836d4e0b8
https://git.kernel.org/stable/c/59ee68c437c562170265194a99698c805a686bb3
https://git.kernel.org/stable/c/7845914f45f066497ac75b30c50dbc735e84e884
https://git.kernel.org/stable/c/891ca5dfe3b718b441fc786014a7ba8f517da188
https://git.kernel.org/stable/c/af78b0489e8898a8c9449ffc0fdd2e181916f0d4
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.