#VU90507 NULL pointer dereference in Linux kernel - CVE-2024-35933


Vulnerability identifier: #VU90507

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35933

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the btintel_read_version() function in drivers/bluetooth/btintel.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/ec2049fb2b8be3e108fe2ef1f1040f91e72c9990
https://git.kernel.org/stable/c/68a69bb2ecafaacdb998a87783068fb51736f43b
https://git.kernel.org/stable/c/86e9b47e8a75c74b1bd83a479979b425c5dc8bd9
https://git.kernel.org/stable/c/006936ecb4edfc3102464044f75858c714e34d28
https://git.kernel.org/stable/c/b19fe5eea619d54eea59bb8a37c0f8d00ef0e912
https://git.kernel.org/stable/c/ffdca0a62abaf8c41d8d9ea132000fd808de329b
https://git.kernel.org/stable/c/22d3053ef05f0b5045e45bd91e7473846261d65e
https://git.kernel.org/stable/c/b79e040910101b020931ba0c9a6b77e81ab7f645


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability