Vulnerability identifier: #VU97529
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvmet_tcp_install_queue() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/03e1fd0327fa5e2174567f5fe9290fe21d21b8f4
http://git.kernel.org/stable/c/50632b877ce55356f5d276b9add289b1e7ddc683
http://git.kernel.org/stable/c/91dad30c5607e62864f888e735d0965567827bdf
http://git.kernel.org/stable/c/7957c731fc2b23312f8935812dee5a0b14b04e2d
http://git.kernel.org/stable/c/489f2913a63f528cfe3f21722583fb981967ecda
http://git.kernel.org/stable/c/6c04d1e3ab22cc5394ef656429638a5947f87244
http://git.kernel.org/stable/c/5572a55a6f830ee3f3a994b6b962a5c327d28cb3
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.