#VU96179 Resource management error in Linux kernel - CVE-2024-43851
Published: August 19, 2024 / Updated: May 12, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DEFINE_PER_CPU_READ_MOSTLY(), xlnx_disable_percpu_irq() and xlnx_event_init_sgi() functions in drivers/soc/xilinx/xlnx_event_manager.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46
- https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5
- https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df
- https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.103
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.44