NULL pointer dereference in Linux kernel usb dwc2 driver



| Updated: 2025-05-14
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-52855
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU90435

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52855

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drivers/usb/dwc2/hcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.14 - 6.7 rc7

CPE2.3 External links

https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.330
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.299
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.201
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.139
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.261
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.63
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.2
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###