Vulnerability identifier: #VU99207
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hix5hd2_rx() function in drivers/net/ethernet/hisilicon/hix5hd2_gmac.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/179499e7a240b2ef590f05eb379c810c26bbc8a4
https://git.kernel.org/stable/c/8067cd244cea2c332f8326842fd10158fa2cb64f
https://git.kernel.org/stable/c/3a4eddd1cb023a71df4152fcc76092953e6fe95a
https://git.kernel.org/stable/c/1b6360a093ab8969c91a30bb58b753282e2ced4c
https://git.kernel.org/stable/c/93aaa4bb72e388f6a4887541fd3d18b84f1b5ddc
https://git.kernel.org/stable/c/b8ce0e6f9f88a6bb49d291498377e61ea27a5387
https://git.kernel.org/stable/c/b6307f7a2fc1c5407b6176f2af34a95214a8c262
https://git.kernel.org/stable/c/433c07a13f59856e4585e89e86b7d4cc59348fab
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.