#VU91639 Memory leak in Linux kernel - CVE-2024-35871


Vulnerability identifier: #VU91639

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35871

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __asm__() and copy_thread() functions in arch/riscv/kernel/process.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/9abc3e6f1116adb7a2d4fbb8ce20c37916976bf5
https://git.kernel.org/stable/c/dff6072124f6df77bfd36951fbd88565746980ef
https://git.kernel.org/stable/c/f6583444d7e78dae750798552b65a2519ff3ca84
https://git.kernel.org/stable/c/00effef72c98294edb1efa87ffa0f6cfb61b36a4
https://git.kernel.org/stable/c/d8dcba0691b8e42bddb61aab201e4d918a08e5d9
https://git.kernel.org/stable/c/d14fa1fcf69db9d070e75f1c4425211fa619dfc8


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability