Infinite loop in Linux kernel soc qcom driver



Published: 2024-09-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-46689
CWE-ID CWE-835
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Infinite loop

EUVDB-ID: #VU97279

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-46689

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the cmd_db_dev_probe() function in drivers/soc/qcom/cmd-db.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

CPE2.3
External links

http://git.kernel.org/stable/c/0ee9594c974368a17e85a431e9fe1c14fb65c278
http://git.kernel.org/stable/c/f5a5a5a0e95f36e2792d48e6e4b64e665eb01374
http://git.kernel.org/stable/c/eaff392c1e34fb77cc61505a31b0191e5e46e271
http://git.kernel.org/stable/c/d9d48d70e922b272875cda60d2ada89291c840cf
http://git.kernel.org/stable/c/ef80520be0ff78ae5ed44cb6eee1525e65bebe70
http://git.kernel.org/stable/c/62c2d63605ca25b5db78a347ed303c0a0a77d5b4
http://git.kernel.org/stable/c/f9bb896eab221618927ae6a2f1d566567999839d


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###