#VU94250 NULL pointer dereference in Linux kernel


Vulnerability identifier: #VU94250

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-40945

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/700f564758882db7c039dfba9443fe762561a3f8
http://git.kernel.org/stable/c/cf34f8f66982a36e5cba0d05781b21ec9606b91e
http://git.kernel.org/stable/c/2973b8e7d127754de9013177c41c0b5547406998
http://git.kernel.org/stable/c/7388ae6f26c0ba95f70cc96bf9c5d5cb06c908b6
http://git.kernel.org/stable/c/61a96da9649a6b6a1a5d5bde9374b045fdb5c12e
http://git.kernel.org/stable/c/89e8a2366e3bce584b6c01549d5019c5cda1205e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability