Vulnerability identifier: #VU102897
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57874
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tagged_addr_ctrl_get() and tagged_addr_ctrl_set() functions in arch/arm64/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/1152dd13845efde5554f80c7e1233bae1d26bd3e
https://git.kernel.org/stable/c/1370cf3eb5495d70e00547598583a4cd45b40b99
https://git.kernel.org/stable/c/1c176f5155ee6161fee6f416b64aa50394d3f220
https://git.kernel.org/stable/c/96035c0093db258975b8887676afe59a64c34a72
https://git.kernel.org/stable/c/abd614bbfcee73247495bd9472da8f85ac83546e
https://git.kernel.org/stable/c/ca62d90085f4af36de745883faab9f8a7cbb45d3
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.