#VU95010 Double free in Linux kernel


Published: 2024-07-31

Vulnerability identifier: #VU95010

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41046

CWE-ID: CWE-415

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ltq_etop_free_channel() function in drivers/net/ethernet/lantiq_etop.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/1a2db00a554cfda57c397cce79b2804bf9633fec
http://git.kernel.org/stable/c/907443174e76b854d28024bd079f0e53b94dc9a1
http://git.kernel.org/stable/c/22b16618a80858b3a9d607708444426948cc4ae1
http://git.kernel.org/stable/c/69ad5fa0ce7c548262e0770fc2b726fe7ab4f156
http://git.kernel.org/stable/c/c2b66e2b3939af63699e4a4bd25a8ac4a9b1d1b3
http://git.kernel.org/stable/c/9d23909ae041761cb2aa0c3cb1748598d8b6bc54
http://git.kernel.org/stable/c/84aaaa796a19195fc59290154fef9aeb1fba964f
http://git.kernel.org/stable/c/e1533b6319ab9c3a97dad314dd88b3783bc41b69


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability