#VU92074 NULL pointer dereference in Linux kernel


Published: 2024-06-13

Vulnerability identifier: #VU92074

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52470

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the radeon_crtc_init() function in drivers/gpu/drm/radeon/radeon_display.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
http://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
http://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
http://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
http://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
http://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
http://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
http://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability