#VU102096 NULL pointer dereference in Linux kernel - CVE-2024-56688
Published: December 30, 2024 / Updated: May 12, 2025
Vulnerability identifier: #VU102096
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-56688
CWE-ID: CWE-476
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964
- https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51
- https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40
- https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a
- https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e
- https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b
- https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a
- https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.174