Vulnerability identifier: #VU92071
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tusb_musb_init() function in drivers/usb/musb/tusb6010.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/1ba7605856e05fa991d4654ac69e5ace66c767b9
http://git.kernel.org/stable/c/b3f43659eb0b9af2e6ef18a8d829374610b19e7a
http://git.kernel.org/stable/c/28be095eb612a489705d38c210afaf1103c5f4f8
http://git.kernel.org/stable/c/f87a79c04a33ab4e5be598c7b0867e6ef193d702
http://git.kernel.org/stable/c/3ee15f1af17407be381bcf06a78fa60b471242dd
http://git.kernel.org/stable/c/679eee466d0f9ffa60a2b0c6ec19be5128927f04
http://git.kernel.org/stable/c/06cfb4cb2241e704d72e3045cf4d7dfb567fbce0
http://git.kernel.org/stable/c/14651496a3de6807a17c310f63c894ea0c5d858e
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.