NULL pointer dereference in Linux kernel sunrpc



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-56688
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU102096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.15 - 5.15.173

CPE2.3 External links

https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964
https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51
https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40
https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a
https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e
https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b
https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a
https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.174


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###