#VU91504 Improper locking in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91504

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52774

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dasd_profile_start() function in drivers/s390/block/dasd.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
http://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
http://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
http://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
http://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
http://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
http://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
http://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability