Vulnerability identifier: #VU92055
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-388
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130
http://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec
http://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c
http://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420
http://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d
http://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0
http://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61
http://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.