#VU91229 NULL pointer dereference in Linux kernel


Published: 2024-06-05

Vulnerability identifier: #VU91229

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52853

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cp2112_gpio_irq_startup() and cp2112_probe() functions in drivers/hid/hid-cp2112.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/df0daac2709473531d6a3472997cc65301ac06d6
http://git.kernel.org/stable/c/727203e6e7e7020e1246fc1628cbdb8d90177819
http://git.kernel.org/stable/c/3d959406c8fff2334d83d0c352d54fd6f5b2e7cd
http://git.kernel.org/stable/c/012d0c66f9392a99232ac28217229f32dd3a70cf
http://git.kernel.org/stable/c/bafb12b629b7c3ad59812dd1ac1b0618062e0e38
http://git.kernel.org/stable/c/fb5718bc67337dde1528661f419ffcf275757592
http://git.kernel.org/stable/c/eb1121fac7986b30915ba20c5a04cc01fdcf160c
http://git.kernel.org/stable/c/e3c2d2d144c082dd71596953193adf9891491f42


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability