Vulnerability identifier: #VU92953
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the spu2_dump_omd() function in drivers/crypto/bcm/spu2.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434
http://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b
http://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6
http://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd
http://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd
http://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0
http://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5
http://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57
http://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.