#VU92020 Improper locking in Linux kernel - CVE-2024-35934


Vulnerability identifier: #VU92020

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35934

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/bc4d1ebca11b4f194e262326bd45938e857c59d2
https://git.kernel.org/stable/c/b9117dc783c0ab0a3866812f70e07bf2ea071ac4
https://git.kernel.org/stable/c/d7ee3bf0caf599c14db0bf4af7aacd6206ef8a23
https://git.kernel.org/stable/c/a2e6bffc0388526ed10406040279a693d62b36ec
https://git.kernel.org/stable/c/6e920422e7104928f760fc0e12b6d65ab097a2e7
https://git.kernel.org/stable/c/00af2aa93b76b1bade471ad0d0525d4d29ca5cc0


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability