Linux Kernel: IOCTL Memory Corruption via Signal Interruption
CVE-2024-23354 Published on May 6, 2024

Use After Free in Graphics Linux
Memory corruption when the IOCTL call is interrupted by a signal.

NVD

Vulnerability Analysis

CVE-2024-23354 is exploitable with local system access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2024-23354 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2024-23354

Want to know whenever a new CVE is published for Google Android? stack.watch will email you.

 

Affected Versions

Qualcomm, Inc. Snapdragon: qualcomm snapdragon: qualcomm fastconnect_6700_firmware: qualcomm fastconnect_6900_firmware: qualcomm fastconnect_7800_firmware: qualcomm flight_rb5_5g_platform_firmware: qualcomm qam8255p_firmware: qualcomm qam8650p_firmware: qualcomm qam8775p_firmware: qualcomm qamsrv1h_firmware: qualcomm qamsrv1m_firmware: qualcomm qca6391_firmware: qualcomm qca6574_firmware: qualcomm qca6574a_firmware: qualcomm qca6574au_firmware: qualcomm qca6595_firmware: qualcomm qca6595au_firmware: qualcomm qca6696_firmware: qualcomm qca6698aq_firmware: qualcomm qca6797aq_firmware: qualcomm qcm4325_firmware: qualcomm qcm4490_firmware: qualcomm qcm8550_firmware: qualcomm qcs4490_firmware: qualcomm qcs7230_firmware: qualcomm qcs8550_firmware: qualcomm qrb5165n_firmware: qualcomm_video_collaboration_vc5_platform_firmware: qualcomm robotics_rb5_platform_firmware: qualcomm sa6155p_firmware: qualcomm sa7255p_firmware: qualcomm sa8155p_firmware: qualcomm sa8195p_firmware: qualcomm sa8620p_firmware: qualcomm sa8650p_firmware: qualcomm sa8770p_firmware: qualcomm sa8775p_firmware: qualcomm sa9000p_firmware: qualcomm sd_8_gen1_5g_firmware: qualcomm sg8275p_firmware: qualcomm sm8550p_firmware: qualcomm snapdragon_4_gen_2_mobile_platform_firmware: qualcomm snapdragon_680_4g_mobile_platform_firmware: qualcomm snapdragon_8_gen_1_mobile_platform_firmware: qualcomm snapdragon_8_gen_2_mobile_platform_firmware: qualcomm srv1h_firmware:

Exploit Probability

EPSS
0.13%
Percentile
32.98%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.