Vulnerability identifier: #VU92020
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-667
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/bc4d1ebca11b4f194e262326bd45938e857c59d2
http://git.kernel.org/stable/c/b9117dc783c0ab0a3866812f70e07bf2ea071ac4
http://git.kernel.org/stable/c/d7ee3bf0caf599c14db0bf4af7aacd6206ef8a23
http://git.kernel.org/stable/c/a2e6bffc0388526ed10406040279a693d62b36ec
http://git.kernel.org/stable/c/6e920422e7104928f760fc0e12b6d65ab097a2e7
http://git.kernel.org/stable/c/00af2aa93b76b1bade471ad0d0525d4d29ca5cc0
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.