Denial of service in Linux kernel serial 8250 driver



Published: 2024-05-08
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-52457
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU89242

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52457

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the omap8250_remove() function in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linux kernel: before 5.4.268

External links

http://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
http://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
http://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
http://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
http://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
http://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
http://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###