Vulnerability identifier: #VU94315
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c
http://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de
http://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7
http://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805
http://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d
http://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940
http://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154
http://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.