Memory leak in Linux kernel can



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-46771
CWE-ID CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Memory leak

EUVDB-ID: #VU97485

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46771

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 6.10.9

CPE2.3 External links

https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92
https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd
https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849
https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a
https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8
https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50
https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4
https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.322
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.226
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.167
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.284
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.110
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.10
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###