#VU90425 NULL pointer dereference in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90425

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52865

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_topckgen_init(), mtk_infrasys_init_early() and mtk_infrasys_init() functions in drivers/clk/mediatek/clk-mt6797.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/c26feedbc561f2a3cee1a4f717e61bdbdfb4fa92
http://git.kernel.org/stable/c/4c79cbfb8e9e2311be77182893fda5ea4068c836
http://git.kernel.org/stable/c/2705c5b97f504e831ae1935c05f0e44f80dfa6b3
http://git.kernel.org/stable/c/81b16286110728674dcf81137be0687c5055e7bf
http://git.kernel.org/stable/c/3aefc6fcfbada57fac27f470602d5565e5b76cb4
http://git.kernel.org/stable/c/357df1c2f6ace96defd557fad709ed1f9f70e16c
http://git.kernel.org/stable/c/be3f12f16038a558f08fa93cc32fa715746a5235
http://git.kernel.org/stable/c/122ac6496e4975ddd7ec1edba4f6fc1e15e39478
http://git.kernel.org/stable/c/606f6366a35a3329545e38129804d65ef26ed7d2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability