#VU90013 Memory leak in Linux kernel


Published: 2024-05-30

Vulnerability identifier: #VU90013

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47173

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the uss720_probe() function in drivers/usb/misc/uss720.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/5f46b2410db2c8f26b8bb91b40deebf4ec184391
http://git.kernel.org/stable/c/7889c70e6173ef358f3cd7578db127a489035a42
http://git.kernel.org/stable/c/bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364
http://git.kernel.org/stable/c/386918878ce4cd676e4607233866e03c9399a46a
http://git.kernel.org/stable/c/36b5ff1db1a4ef4fdbc2bae364344279f033ad88
http://git.kernel.org/stable/c/5394ae9d8c7961dd93807fdf1b12a1dde96b0a55
http://git.kernel.org/stable/c/a3c3face38cb49932c62adcc1289914f1c742096
http://git.kernel.org/stable/c/dcb4b8ad6a448532d8b681b5d1a7036210b622de


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability