#VU90529 NULL pointer dereference in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90529

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36937

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __xdp_do_redirect_frame(), EXPORT_SYMBOL_GPL(), xdp_do_generic_redirect_map() and xdp_do_generic_redirect() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/12481f30128fbebc2eeb55eb2d56390fdfa30c5e
http://git.kernel.org/stable/c/272bfb019f3cc018f654b992115774e77b4f3ffc
http://git.kernel.org/stable/c/e22e25820fa04ea5eaac4ef7ee200e9923f466a4
http://git.kernel.org/stable/c/6fd81f9d333e7b3532036577b1beb74ba1323553
http://git.kernel.org/stable/c/5bcf0dcbf9066348058b88a510c57f70f384c92c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability