#VU90575 NULL pointer dereference in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90575

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26874

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_drm_crtc_finish_page_flip() function in drivers/gpu/drm/mediatek/mtk_drm_crtc.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/accdac6b71d5a2b84040c3d2234f53a60edc398e
http://git.kernel.org/stable/c/dfde84cc6c589f2a9f820f12426d97365670b731
http://git.kernel.org/stable/c/4688be96d20ffa49d2186523ee84f475f316fd49
http://git.kernel.org/stable/c/9beec711a17245b853d64488fd5b739031612340
http://git.kernel.org/stable/c/d2bd30c710475b2e29288827d2c91f9e6e2b91d7
http://git.kernel.org/stable/c/a3dd12b64ae8373a41a216a0b621df224210860a
http://git.kernel.org/stable/c/9acee29a38b4d4b70f1f583e5ef9a245db4db710
http://git.kernel.org/stable/c/3fc88b246a2fc16014e374040fc15af1d3752535
http://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability