Vulnerability identifier: #VU104878
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ath11k_ahb_free_ext_irq() function in drivers/net/wireless/ath/ath11k/ahb.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/22b59cb965f79ee1accf83172441c9ca0ecb632a
https://git.kernel.org/stable/c/38e488db194dc16d2eb23c77c6a8c04ff583c40d
https://git.kernel.org/stable/c/699e8c87e5c406af0f0606f40eeebd248c51b702
https://git.kernel.org/stable/c/c4b7653af62a9a5efe2856183d1f987c5429758b
https://git.kernel.org/stable/c/c6a815f5abdf324108799829dd19ea62fef4bf95
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.