#VU93377 Race condition in Linux kernel


Published: 2024-06-26

Vulnerability identifier: #VU93377

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35986

CWE-ID: CWE-362

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the tusb1210_get_online() and tusb1210_remove_charger_detect() functions in drivers/phy/ti/phy-tusb1210.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8
http://git.kernel.org/stable/c/73224a5d2180066c7fe05b4656647601ba08d588
http://git.kernel.org/stable/c/9827caa5105fb16d1fae2e75c8d0e4662014b3ca
http://git.kernel.org/stable/c/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability