#VU97529 NULL pointer dereference in Linux kernel


Vulnerability identifier: #VU97529

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-46737

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nvmet_tcp_install_queue() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/03e1fd0327fa5e2174567f5fe9290fe21d21b8f4
http://git.kernel.org/stable/c/50632b877ce55356f5d276b9add289b1e7ddc683
http://git.kernel.org/stable/c/91dad30c5607e62864f888e735d0965567827bdf
http://git.kernel.org/stable/c/7957c731fc2b23312f8935812dee5a0b14b04e2d
http://git.kernel.org/stable/c/489f2913a63f528cfe3f21722583fb981967ecda
http://git.kernel.org/stable/c/6c04d1e3ab22cc5394ef656429638a5947f87244
http://git.kernel.org/stable/c/5572a55a6f830ee3f3a994b6b962a5c327d28cb3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability