#VU93048 NULL pointer dereference in Linux kernel


Published: 2024-06-21

Vulnerability identifier: #VU93048

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38605

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the snd_card_new() function in sound/core/init.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434
http://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811
http://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e
http://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92
http://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5
http://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12
http://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability