Vulnerability identifier: #VU89242
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor:
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the omap8250_remove() function in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
http://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
http://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
http://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
http://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
http://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
http://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.