#VU102897 Memory leak in Linux kernel - CVE-2024-57874


Vulnerability identifier: #VU102897

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57874

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/1152dd13845efde5554f80c7e1233bae1d26bd3e
https://git.kernel.org/stable/c/1370cf3eb5495d70e00547598583a4cd45b40b99
https://git.kernel.org/stable/c/1c176f5155ee6161fee6f416b64aa50394d3f220
https://git.kernel.org/stable/c/96035c0093db258975b8887676afe59a64c34a72
https://git.kernel.org/stable/c/abd614bbfcee73247495bd9472da8f85ac83546e
https://git.kernel.org/stable/c/ca62d90085f4af36de745883faab9f8a7cbb45d3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability