Vulnerability identifier: #VU95010
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-415
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ltq_etop_free_channel() function in drivers/net/ethernet/lantiq_etop.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/1a2db00a554cfda57c397cce79b2804bf9633fec
https://git.kernel.org/stable/c/907443174e76b854d28024bd079f0e53b94dc9a1
https://git.kernel.org/stable/c/22b16618a80858b3a9d607708444426948cc4ae1
https://git.kernel.org/stable/c/69ad5fa0ce7c548262e0770fc2b726fe7ab4f156
https://git.kernel.org/stable/c/c2b66e2b3939af63699e4a4bd25a8ac4a9b1d1b3
https://git.kernel.org/stable/c/9d23909ae041761cb2aa0c3cb1748598d8b6bc54
https://git.kernel.org/stable/c/84aaaa796a19195fc59290154fef9aeb1fba964f
https://git.kernel.org/stable/c/e1533b6319ab9c3a97dad314dd88b3783bc41b69
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.