#VU96287 Memory leak in Linux kernel - CVE-2024-43871


Vulnerability identifier: #VU96287

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43871

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85
https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf
https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85
https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96
https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d
https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701
https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c
https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability