Vulnerability identifier: #VU104327
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usbnet_async_cmd_cb() and usbnet_write_cmd_async() functions in drivers/net/usb/usbnet.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/0085da9df3dced730027923a6b48f58e9016af91
https://git.kernel.org/stable/c/04894ab34faf40ab72a8a5ab5b404bb0606bbbff
https://git.kernel.org/stable/c/3eed421ca5c809da93456f69203d164d5220be3d
https://git.kernel.org/stable/c/5269209f54dd8dfd15f9383f3a3a1fe8370764f8
https://git.kernel.org/stable/c/b55a21b764c1e182014630fa5486d717484ac58f
https://git.kernel.org/stable/c/d5165e657987ff4ba0ace896d4376a3718a9fbc3
https://git.kernel.org/stable/c/db89582ff330556188da856e01382ccbf3a5e706
https://git.kernel.org/stable/c/e7b4f69946a38209b4a4f660bf0e4cbed94f9b4b
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.