#VU94201 Memory leak in Linux kernel


Published: 2024-07-13

Vulnerability identifier: #VU94201

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-39499

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81
http://git.kernel.org/stable/c/681967c4ff210e06380acf9b9a1b33ae06e77cbd
http://git.kernel.org/stable/c/f70ff737346744633e7b655c1fb23e1578491ff3
http://git.kernel.org/stable/c/95ac3e773a1f8da83c4710a720fbfe80055aafae
http://git.kernel.org/stable/c/95bac1c8bedb362374ea1937b1d3e833e01174ee
http://git.kernel.org/stable/c/e293c6b38ac9029d76ff0d2a6b2d74131709a9a8
http://git.kernel.org/stable/c/757804e1c599af5d2a7f864c8e8b2842406ff4bb
http://git.kernel.org/stable/c/8003f00d895310d409b2bf9ef907c56b42a4e0f4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability