Vulnerability identifier: #VU93871
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26997
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the dwc2_cmpl_host_isoc_dma_desc() function in drivers/usb/dwc2/hcd_ddma.c in DDMA completion flow. A local user can perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/8aa5c28ac65cb5e7f1b9c0c3238c00b661dd2b8c
https://git.kernel.org/stable/c/9de10b59d16880a0a3ae2876c142fe54ce45d816
https://git.kernel.org/stable/c/8a139fa44870e84ac228b7b76423a49610e5ba9a
https://git.kernel.org/stable/c/55656b2afd5f1efcec4245f3e7e814c2a9ef53f6
https://git.kernel.org/stable/c/eed04fa96c48790c1cce73c8a248e9d460b088f8
https://git.kernel.org/stable/c/257d313e37d66c3bcc87197fb5b8549129c45dfe
https://git.kernel.org/stable/c/75bf5e78b2a27cb1bca6fa826e3ab685015165e1
https://git.kernel.org/stable/c/26fde0ea40dda1b08fad3bc0a43f122f6dd8bddf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.