Vulnerability identifier: #VU104282
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the register_node() function in drivers/base/node.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/386e69e068177ee91cac27f2f0e6ebda1515f5ca
https://git.kernel.org/stable/c/39642b0feddb9c39faa6de469a94bfeb4dc0d3a9
https://git.kernel.org/stable/c/466134df7561aeb801baddf6666b512e0e1a1707
https://git.kernel.org/stable/c/606732650a2c88e66c59c22dd5464ea0d820250e
https://git.kernel.org/stable/c/6905be93d1ab54f73718047536fec0ca488d5315
https://git.kernel.org/stable/c/b3fcf1f583b1a0946d9d9bfb7362c9c186801775
https://git.kernel.org/stable/c/d8a5bdc767f17281da648555cdbd286f98fd98ee
https://git.kernel.org/stable/c/da63dc84befaa9e6079a0bc363ff0eaa975f9073
https://git.kernel.org/stable/c/f76ddc8fcf6d81fe89bfa4d3efcbc4fe69a91d48
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.