#VU93818 Memory leak in Linux kernel


Vulnerability identifier: #VU93818

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-39484

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the davinci_mmcsd_remove() and __exit_p() functions in drivers/mmc/host/davinci_mmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/5ee241f72edc6dce5051a5f100eab6cc019d873e
http://git.kernel.org/stable/c/7590da4c04dd4aa9c262da0231e978263861c6eb
http://git.kernel.org/stable/c/1d5ed0efe51d36b9ae9b64f133bf41cdbf56f584
http://git.kernel.org/stable/c/55c421b364482b61c4c45313a535e61ed5ae4ea3
http://git.kernel.org/stable/c/6ff7cfa02baabec907f6f29ea76634e6256d2ec4
http://git.kernel.org/stable/c/aea35157bb9b825faa0432bd0f7fbea37ff39aa1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability