#VU87991 NULL pointer dereference in Linux kernel


Published: 2024-04-02

Vulnerability identifier: #VU87991

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-46905

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error on disconnect regression within the hso_serial_tty_unregister() functin in drivers/net/usb/hso.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725
http://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e
http://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273
http://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00
http://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef
http://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability