Vulnerability identifier: #VU104901
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the raid5_add_disk() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/02cffb1921edadd9b6e4eee7ada4a5213e8ba12e
https://git.kernel.org/stable/c/2d4e7c9898c20fb3d3f55381cab601761aab7d64
https://git.kernel.org/stable/c/2fb2928728038280bd925ce2aafb4997e9d47ee9
https://git.kernel.org/stable/c/3553a69bb52be2deba61d0ca064c41aee842bb35
https://git.kernel.org/stable/c/617b365872a247480e9dcd50a32c8d1806b21861
https://git.kernel.org/stable/c/d5b06039b195d4b6f94f5d345b1e4ac1975a9832
https://git.kernel.org/stable/c/d8bca518d5272fe349e0a722fdb9e3acb661f3f0
https://git.kernel.org/stable/c/f157bd9cf377a947fdb7035e69466b6ecdc17c17
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.