Vulnerability identifier: #VU90920
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-415
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the regcache_rbtree_insert_to_block() function in drivers/base/regmap/regcache-rbtree.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
http://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
http://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
http://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
http://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
http://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
http://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
http://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.