Vulnerability identifier: #VU114163
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-667
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the include/drm/spsc_queue.h. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/549a9c78c3ea6807d0dc4162a4f5ba59f217d5a0
https://git.kernel.org/stable/c/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee
https://git.kernel.org/stable/c/c64f5310530baf75328292f9b9f3f2961d185183
https://git.kernel.org/stable/c/e2d6547dc8b9b332f9bc00875197287a6a4db65a
https://git.kernel.org/stable/c/e62f51d0ec8a9baf324caf9a564f8e318d36a551
https://git.kernel.org/stable/c/ef58a95457466849fa7b31fd3953801a5af0f58b
https://git.kernel.org/stable/c/ef841f8e4e1ff67817ca899bedc5ebb00847c0a7
https://git.kernel.org/stable/c/f9a4f28a4fc4ee453a92a9abbe36e26224d17749
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?