Memory leak in Linux kernel base driver



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-43871
CWE-ID CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Memory leak

EUVDB-ID: #VU96287

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43871

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 6.10.2

CPE2.3 External links

https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85
https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf
https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85
https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96
https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d
https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701
https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c
https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.320
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.224
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.165
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.282
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.103
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.3
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.44


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###