#VU102160 Improper locking in Linux kernel - CVE-2024-56594


Vulnerability identifier: #VU102160

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56594

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/13c3a54f48a612a117dfd82a9dd91732261e869d
https://git.kernel.org/stable/c/76581147b05c2adb6b47bbc697521725f10224e4
https://git.kernel.org/stable/c/76649ccf97e2cd72b62e34ed2fba6e0f89497eab
https://git.kernel.org/stable/c/b5807a08954fdf914ef80b49aaa6cda965ecc95c
https://git.kernel.org/stable/c/b9e52a96ec92245bf15dabba1d3d862d7a03efb8
https://git.kernel.org/stable/c/e2e97435783979124ba92d6870415c57ecfef6a5
https://git.kernel.org/stable/c/ff0346a74627a5f607a33a3852586f8c7f678329


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability