Vulnerability identifier: #VU104397
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the atmel_nand_controller_init() function in drivers/mtd/nand/atmel/nand-controller.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/0856bf27057561f42b37df111603cf5a0d040294
https://git.kernel.org/stable/c/8baea2b96fa90af8d0f937caf4cf2105ee094d93
https://git.kernel.org/stable/c/9843c9c98f26c6ad843260b19bfdaa2598f2ae1e
https://git.kernel.org/stable/c/9b08d211db4c447eb1a07df65e45e0aa772e0fa6
https://git.kernel.org/stable/c/a3587259ae553e41d1ce8c7435351a5d6b299a11
https://git.kernel.org/stable/c/f1694169f3674cdf7553aed06864254635679878
https://git.kernel.org/stable/c/fe0e2ce5c87e9c0b9485ff566362030aa55972cf
https://git.kernel.org/stable/c/fecbd4a317c95d73c849648c406bcf1b6a0ec1cf
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.