Vulnerability identifier: #VU39739
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local authenticated user to execute arbitrary code.
The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 4.9 - 4.9.5
External links
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a45f795c65b479b4ba107b6ccde29b896d51ee98
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
https://www.openwall.com/lists/oss-security/2017/01/21/3
https://www.securityfocus.com/bid/95713
https://bugzilla.redhat.com/show_bug.cgi?id=1416101
https://github.com/torvalds/linux/commit/a45f795c65b479b4ba107b6ccde29b896d51ee98
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.