Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52650 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90517
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52650
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tegra_dsi_ganged_probe() function in drivers/gpu/drm/tegra/dsi.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80
http://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5
http://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129
http://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d
http://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6
http://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976
http://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9
http://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc
http://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.