#VU92346 NULL pointer dereference in Linux kernel


Published: 2024-06-20

Vulnerability identifier: #VU92346

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38571

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the compute_intercept_slope() function in drivers/thermal/qcom/tsens.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/27600e0c5272a262b0903e35ae1df37d33c5c1ad
http://git.kernel.org/stable/c/11c731386ed82053c2759b6fea1a82ae946e5e0f
http://git.kernel.org/stable/c/2d5ca6e4a2872e92a32fdfd87e04dd7d3ced7278
http://git.kernel.org/stable/c/06d17744b77bc6cb29a6c785f4fad8c4163ee653
http://git.kernel.org/stable/c/fcf5f1b5f308f2eb422f6aca55d295b25890906b
http://git.kernel.org/stable/c/d998ddc86a27c92140b9f7984ff41e3d1d07a48f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability