Vulnerability identifier: #VU90852
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the drivers/net/usb/usbnet.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 4.4 - 4.4.290, 4.9 - 4.9.288, 4.14 - 4.14.253, 4.19 - 4.19.214, 5.4 - 5.4.156, 5.10 - 5.10.76, 5.14 - 5.14.15-300.fc35, 5.15 rc1 - 5.15 rc7
External links
https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e
https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767
https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4
https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed
https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20
https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a
https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5
https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.254
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.215
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.291
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.289
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.77
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.157
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?