#VU93344 Buffer overflow in Linux kernel


Published: 2024-06-25

Vulnerability identifier: #VU93344

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38544

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rxe_comp_queue_pkt() function in drivers/infiniband/sw/rxe/rxe_comp.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/faa8d0ecf6c9c7c2ace3ca3e552180ada6f75e19
http://git.kernel.org/stable/c/21b4c6d4d89030fd4657a8e7c8110fd941049794
http://git.kernel.org/stable/c/bbad88f111a1829f366c189aa48e7e58e57553fc
http://git.kernel.org/stable/c/30df4bef8b8e183333e9b6e9d4509d552c7da6eb
http://git.kernel.org/stable/c/2b23b6097303ed0ba5f4bc036a1c07b6027af5c6


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability