#VU92020 Improper locking in Linux kernel


Vulnerability identifier: #VU92020

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35934

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/bc4d1ebca11b4f194e262326bd45938e857c59d2
http://git.kernel.org/stable/c/b9117dc783c0ab0a3866812f70e07bf2ea071ac4
http://git.kernel.org/stable/c/d7ee3bf0caf599c14db0bf4af7aacd6206ef8a23
http://git.kernel.org/stable/c/a2e6bffc0388526ed10406040279a693d62b36ec
http://git.kernel.org/stable/c/6e920422e7104928f760fc0e12b6d65ab097a2e7
http://git.kernel.org/stable/c/00af2aa93b76b1bade471ad0d0525d4d29ca5cc0


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability