#VU102096 NULL pointer dereference in Linux kernel - CVE-2024-56688


Vulnerability identifier: #VU102096

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56688

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964
https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51
https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40
https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a
https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e
https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b
https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a
https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability