Vulnerability identifier: #VU93841
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the rds_sendmsg() function in net/rds/send.c, within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4
http://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b
http://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2
http://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0
http://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80
http://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85
http://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1
http://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38
http://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
http://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.