Vulnerability identifier: #VU92048
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-667
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1
http://git.kernel.org/stable/c/17728616a4c85baf0edc975c60ba4e4157684d9a
http://git.kernel.org/stable/c/221142038f36d9f28b64e83e954774da4d4ccd17
http://git.kernel.org/stable/c/4b77ad9097067b31237eeeee0bf70f80849680a0
http://git.kernel.org/stable/c/37d697759958d111439080bab7e14d2b0e7b39f5
http://git.kernel.org/stable/c/beb39adb150f8f3b516ddf7c39835a9788704d23
http://git.kernel.org/stable/c/a76fb9ba545289379acf409653ad5f74417be59c
http://git.kernel.org/stable/c/020ef930b826d21c5446fdc9db80fd72a791bc21
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.