#VU93125 Improper locking in Linux kernel


Published: 2024-06-24

Vulnerability identifier: #VU93125

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-34027

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f2fs_release_compress_blocks() and f2fs_reserve_compress_blocks() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/a6e1f7744e9b84f86a629a76024bba8468aa153b
http://git.kernel.org/stable/c/b5bac43875aa27ec032dbbb86173baae6dce6182
http://git.kernel.org/stable/c/5d47d63883735718825ca2efc4fca6915469774f
http://git.kernel.org/stable/c/329edb7c9e3b6ca27e6ca67ab1cdda1740fb3a2b
http://git.kernel.org/stable/c/69136304fd144144a4828c7b7b149d0f80321ba4
http://git.kernel.org/stable/c/0a4ed2d97cb6d044196cc3e726b6699222b41019


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability