Vulnerability identifier: #VU104814
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-835
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the mutex_lock_double(), perf_event_set_output(), ring_buffer_get() and mutex_unlock() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/17f5417194136517ee9bbd6511249e5310e5617c
https://git.kernel.org/stable/c/3bbd868099287ff9027db59029b502fcfa2202a0
https://git.kernel.org/stable/c/43128b3eee337824158f34da6648163d2f2fb937
https://git.kernel.org/stable/c/68e3c69803dada336893640110cb87221bb01dcf
https://git.kernel.org/stable/c/98c3c8fd0d4c560e0f8335b79c407bbf7fc9462c
https://git.kernel.org/stable/c/a9391ff7a7c5f113d6f2bf6621d49110950de49c
https://git.kernel.org/stable/c/da3c256e2d0ebc87c7db0c605c9692b6f1722074
https://git.kernel.org/stable/c/f836f9ac95df15f1e0af4beb0ec20021e8c91998
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.