#VU91639 Memory leak in Linux kernel


Published: 2024-06-10

Vulnerability identifier: #VU91639

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35871

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __asm__() and copy_thread() functions in arch/riscv/kernel/process.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/9abc3e6f1116adb7a2d4fbb8ce20c37916976bf5
http://git.kernel.org/stable/c/dff6072124f6df77bfd36951fbd88565746980ef
http://git.kernel.org/stable/c/f6583444d7e78dae750798552b65a2519ff3ca84
http://git.kernel.org/stable/c/00effef72c98294edb1efa87ffa0f6cfb61b36a4
http://git.kernel.org/stable/c/d8dcba0691b8e42bddb61aab201e4d918a08e5d9
http://git.kernel.org/stable/c/d14fa1fcf69db9d070e75f1c4425211fa619dfc8


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability