#VU96195 Memory leak in Linux kernel


Published: 2024-08-19

Vulnerability identifier: #VU96195

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-42283

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/1377de719652d868f5317ba8398b7e74c5f0430b
http://git.kernel.org/stable/c/7704460acd7f5d35eb07c52500987dc9b95313fb
http://git.kernel.org/stable/c/a13d3864b76ac87085ec530b2ff8e37482a63a96
http://git.kernel.org/stable/c/6d745cd0e9720282cd291d36b9db528aea18add2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability