Vulnerability identifier: #VU91556
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-665
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165
http://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6
http://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598
http://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a
http://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49
http://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.