#VU90553 NULL pointer dereference in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90553

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35796

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the temac_probe() function in drivers/net/ethernet/xilinx/ll_temac_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/6d9395ba7f85bdb7af0b93272e537484ecbeff48
http://git.kernel.org/stable/c/553d294db94b5f139378022df480a9fb6c3ae39e
http://git.kernel.org/stable/c/46efbdbc95a30951c2579caf97b6df2ee2b3bef3
http://git.kernel.org/stable/c/476eed5f1c22034774902a980aa48dc4662cb39a
http://git.kernel.org/stable/c/7e9edb569fd9f688d887e36db8170f6e22bafbc8
http://git.kernel.org/stable/c/92c0c29f667870f17c0b764544bdf22ce0e886a1
http://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability