#VU95000 Input validation error in Linux kernel - CVE-2024-42092


Vulnerability identifier: #VU95000

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42092

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the davinci_gpio_probe() function in drivers/gpio/gpio-davinci.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684
https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd
https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9
https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b
https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d
https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782
https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470
https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability