SB2024071362 - NULL pointer dereference in Linux kernel core
Published: July 13, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2024-39500)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/4959ffc65a0e94f8acaac20deac49f89e6ded52d
- https://git.kernel.org/stable/c/5eabdf17fed2ad41b836bb4055ec36d95e512c50
- https://git.kernel.org/stable/c/e946428439a0d2079959f5603256ac51b6047017
- https://git.kernel.org/stable/c/3627605de498639a3c586c8684d12c89cba11073
- https://git.kernel.org/stable/c/4b4647add7d3c8530493f7247d11e257ee425bf0
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.162
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.95
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.35