#VU90521 NULL pointer dereference in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90521

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27044

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn10_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_hw_sequencer.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e019d87e02f1e539ae48b99187f253847744ca7a
http://git.kernel.org/stable/c/330caa061af53ea6d287d7c43d0703714e510e08
http://git.kernel.org/stable/c/6ac7c7a3a9ab57aba0fe78ecb922d2b20e16efeb
http://git.kernel.org/stable/c/29fde8895b2fcc33f44aea28c644ce2d9b62f9e0
http://git.kernel.org/stable/c/2d9fe7787af01188dc470a649bdbb842d6511fd7
http://git.kernel.org/stable/c/14613d52bc7fc180df6d2c65ba65fc921fc1dda7
http://git.kernel.org/stable/c/7874ab3105ca4657102fee1cc14b0af70883c484
http://git.kernel.org/stable/c/9ccfe80d022df7c595f1925afb31de2232900656


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability