Vulnerability identifier: #VU89247
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the binder_enqueue_thread_work_ilocked() function in drivers/android/binder.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac
http://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61
http://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc
http://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc
http://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769
http://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68
http://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69
http://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.