#VU90468 Memory leak in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90468

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26900

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bind_rdev_to_array() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/6d32c832a88513f65c2c2c9c75954ee8b387adea
http://git.kernel.org/stable/c/4c1021ce46fc2fb6115f7e79d353941e6dcad366
http://git.kernel.org/stable/c/6cf350658736681b9d6b0b6e58c5c76b235bb4c4
http://git.kernel.org/stable/c/fb5b347efd1bda989846ffc74679d181222fb123
http://git.kernel.org/stable/c/f3a1787dc48213f6caea5ba7d47e0222e7fa34a9
http://git.kernel.org/stable/c/beaf11969fd5cbe6f09cefaa34df1ce8578e8dd9
http://git.kernel.org/stable/c/9fd0198f7ef06ae0d6636fb0578560857dead995


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability