Vulnerability identifier: #VU93048
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the snd_card_new() function in sound/core/init.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434
https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811
https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e
https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92
https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5
https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12
https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.