#VU90922 Double free in Linux kernel


Published: 2024-06-03

Vulnerability identifier: #VU90922

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52667

CWE-ID: CWE-415

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the fs_any_create_groups() function in drivers/net/ethernet/mellanox/mlx5/core/en/fs_tt_redirect.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1
http://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe
http://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8
http://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779
http://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability