Vulnerability identifier: #VU93001
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52511
CWE-ID:
CWE-400
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc
https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb
https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355
https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.