Vulnerability identifier: #VU88885
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-129
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of array index within the dtSplitRoot() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af
http://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07
http://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8
http://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39
http://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60
http://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f
http://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2
http://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.