Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-42090 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU94988
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42090
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04
http://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0
http://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b
http://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e
http://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6
http://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc
http://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd
http://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.