Vulnerability identifier: #VU93384
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-362
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the qla2xxx_mqueuecommand() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
http://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
http://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
http://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
http://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
http://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.