Vulnerability identifier: #VU90529
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __xdp_do_redirect_frame(), EXPORT_SYMBOL_GPL(), xdp_do_generic_redirect_map() and xdp_do_generic_redirect() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/12481f30128fbebc2eeb55eb2d56390fdfa30c5e
http://git.kernel.org/stable/c/272bfb019f3cc018f654b992115774e77b4f3ffc
http://git.kernel.org/stable/c/e22e25820fa04ea5eaac4ef7ee200e9923f466a4
http://git.kernel.org/stable/c/6fd81f9d333e7b3532036577b1beb74ba1323553
http://git.kernel.org/stable/c/5bcf0dcbf9066348058b88a510c57f70f384c92c
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.