Executive Summary

Informations
Name CVE-2024-43871 First vendor Publication 2024-08-21
Vendor Cve Last vendor Modification 2024-09-03

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

devres: Fix memory leakage caused by driver API devm_free_percpu()

It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3645

Sources (Detail)

https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96
https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d
https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85
https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c
https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf
https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701
https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c
https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Date Informations
2025-01-08 03:04:36
  • Multiple Updates
2025-01-07 03:04:09
  • Multiple Updates
2024-12-25 03:02:47
  • Multiple Updates
2024-12-12 03:05:43
  • Multiple Updates
2024-11-23 03:02:46
  • Multiple Updates
2024-11-22 03:00:57
  • Multiple Updates
2024-11-20 02:59:16
  • Multiple Updates
2024-11-14 02:59:35
  • Multiple Updates
2024-11-09 02:59:35
  • Multiple Updates
2024-10-26 02:56:58
  • Multiple Updates
2024-10-25 02:58:51
  • Multiple Updates
2024-10-23 02:58:04
  • Multiple Updates
2024-10-03 02:53:20
  • Multiple Updates
2024-10-02 02:51:43
  • Multiple Updates
2024-09-15 02:49:23
  • Multiple Updates
2024-09-11 21:27:50
  • Multiple Updates
2024-09-06 21:28:11
  • Multiple Updates
2024-09-06 00:27:52
  • Multiple Updates
2024-09-03 21:27:45
  • Multiple Updates
2024-09-03 17:27:39
  • Multiple Updates
2024-08-22 02:48:16
  • Multiple Updates
2024-08-22 02:48:01
  • Multiple Updates
2024-08-21 17:27:26
  • Multiple Updates
2024-08-21 09:27:29
  • First insertion