#VU94482 Resource management error in Linux kernel


Vulnerability identifier: #VU94482

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48845

CWE-ID: CWE-399

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the start_secondary() function in arch/mips/kernel/smp.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/7315f8538db009605ffba00370678142ef00ac98
http://git.kernel.org/stable/c/32813321f18d5432cec1b1a6ecc964f9ea26d565
http://git.kernel.org/stable/c/56eaacb8137ba2071ce48d4e3d91979270e139a7
http://git.kernel.org/stable/c/c2420bc3333111184cdcb112282d13afe1338dd7
http://git.kernel.org/stable/c/e8ad9ecc406974deb5e7c070f51cc1d09d21dc4b
http://git.kernel.org/stable/c/be538b764a46be1d0700fd3b6e82fb76bd17f13a
http://git.kernel.org/stable/c/94647aec80d03d6914aa664b7b8e103cd9d63239
http://git.kernel.org/stable/c/f2703def339c793674010cc9f01bfe4980231808


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability