#VU102198 Improper error handling in Linux kernel - CVE-2024-56681


Vulnerability identifier: #VU102198

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56681

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/05f0a3f5477ecaa1cf46448504afe9e7c2e96fcc
https://git.kernel.org/stable/c/19630cf57233e845b6ac57c9c969a4888925467b
https://git.kernel.org/stable/c/28f8ffa945f7d7150463e15097ea73b19529d6f5
https://git.kernel.org/stable/c/4ea3e3b761e371102bb1486778e2f8dbc9e37413
https://git.kernel.org/stable/c/75e1e38e5d80d6d9011b7322698ffba3dd3db30a
https://git.kernel.org/stable/c/8f1a9a960b1107bd0e0ec3736055f5ed0e717edf
https://git.kernel.org/stable/c/ae5253313e0ea5f00c06176074592b7f493c8546
https://git.kernel.org/stable/c/bba9e38c5ad41d0a88b22a59e5b6dd3e31825118
https://git.kernel.org/stable/c/ee36db8e8203420e6d5c42eb9428920c2fc36532


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability