Vulnerability identifier: #VU94482
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the start_secondary() function in arch/mips/kernel/smp.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/7315f8538db009605ffba00370678142ef00ac98
http://git.kernel.org/stable/c/32813321f18d5432cec1b1a6ecc964f9ea26d565
http://git.kernel.org/stable/c/56eaacb8137ba2071ce48d4e3d91979270e139a7
http://git.kernel.org/stable/c/c2420bc3333111184cdcb112282d13afe1338dd7
http://git.kernel.org/stable/c/e8ad9ecc406974deb5e7c070f51cc1d09d21dc4b
http://git.kernel.org/stable/c/be538b764a46be1d0700fd3b6e82fb76bd17f13a
http://git.kernel.org/stable/c/94647aec80d03d6914aa664b7b8e103cd9d63239
http://git.kernel.org/stable/c/f2703def339c793674010cc9f01bfe4980231808
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.