Vulnerability identifier: #VU93762
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-682
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b
http://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c
http://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860
http://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177
http://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a
http://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7
http://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb
http://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7
http://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
http://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.