#VU90923 Double free in Linux kernel


Published: 2024-06-03

Vulnerability identifier: #VU90923

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35835

CWE-ID: CWE-415

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the arfs_create_groups() function in drivers/net/ethernet/mellanox/mlx5/core/en_arfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629
http://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7
http://git.kernel.org/stable/c/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5
http://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056
http://git.kernel.org/stable/c/42876db001bbea7558e8676d1019f08f9390addb
http://git.kernel.org/stable/c/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7
http://git.kernel.org/stable/c/66cc521a739ccd5da057a1cb3d6346c6d0e7619b
http://git.kernel.org/stable/c/3c6d5189246f590e4e1f167991558bdb72a4738b


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability