Vulnerability identifier: #VU90271
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ENDPROC() function in arch/arm/kernel/sleep.S. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/20ac71bee028ffbae4fc14ed679b23b4d3e95726
https://git.kernel.org/stable/c/ad702338fe423cb1e79745787090317256a98dab
https://git.kernel.org/stable/c/ee0ce7573e5083031960faf602c9db693ab5b477
https://git.kernel.org/stable/c/b26f353786d365e658cebc9a9ace88e04fc2325e
https://git.kernel.org/stable/c/c4238686f9093b98bd6245a348bcf059cdce23af
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.