#VU92055 Improper error handling in Linux kernel


Published: 2024-06-13

Vulnerability identifier: #VU92055

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36950

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130
http://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec
http://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c
http://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420
http://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d
http://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0
http://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61
http://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability