Vulnerability identifier: #VU97173
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45028
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtf_test_write() function in drivers/mmc/core/mmc_test.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/e97be13a9f51284da450dd2a592e3fa87b49cdc9
https://git.kernel.org/stable/c/2b507b03991f44dfb202fc2a82c9874d1b1f0c06
https://git.kernel.org/stable/c/9b9ba386d7bfdbc38445932c90fa9444c0524bea
https://git.kernel.org/stable/c/e40515582141a9e7c84b269be699c05236a499a6
https://git.kernel.org/stable/c/3b4e76ceae5b5a46c968bd952f551ce173809f63
https://git.kernel.org/stable/c/cac2815f49d343b2f0acc4973d2c14918ac3ab0c
https://git.kernel.org/stable/c/ecb15b8ca12c0cbdab81e307e9795214d8b90890
https://git.kernel.org/stable/c/a1e627af32ed60713941cbfc8075d44cad07f6dd
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.