Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-46737 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU97529
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46737
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvmet_tcp_install_queue() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
CPE2.3http://git.kernel.org/stable/c/03e1fd0327fa5e2174567f5fe9290fe21d21b8f4
http://git.kernel.org/stable/c/50632b877ce55356f5d276b9add289b1e7ddc683
http://git.kernel.org/stable/c/91dad30c5607e62864f888e735d0965567827bdf
http://git.kernel.org/stable/c/7957c731fc2b23312f8935812dee5a0b14b04e2d
http://git.kernel.org/stable/c/489f2913a63f528cfe3f21722583fb981967ecda
http://git.kernel.org/stable/c/6c04d1e3ab22cc5394ef656429638a5947f87244
http://git.kernel.org/stable/c/5572a55a6f830ee3f3a994b6b962a5c327d28cb3
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.