Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-53101 |
CWE-ID | CWE-908 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU100940
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-53101
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_setattr() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
CPE2.3 External linkshttp://git.kernel.org/stable/c/15f34347481648a567db67fb473c23befb796af5
http://git.kernel.org/stable/c/17ecb40c5cc7755a321fb6148cba5797431ee5b8
http://git.kernel.org/stable/c/1c28bca1256aecece6e94b26b85cd07e08b0dc90
http://git.kernel.org/stable/c/1cb5bfc5bfc651982b6203c224d49b7ddacf28bc
http://git.kernel.org/stable/c/5a72b0d3497b818d8f000c347a7c11801eb27bfc
http://git.kernel.org/stable/c/9db25c2b41c34963c3ccf473b08171f87670652e
http://git.kernel.org/stable/c/a0c77e5e3dcbffc7c6080ccc89c037f0c86496cf
http://git.kernel.org/stable/c/b3e612bd8f64ce62e731e95f635e06a2efe3c80c
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.