Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52855 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90435
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52855
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/usb/dwc2/hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 6.7 rc7
CPE2.3https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.330
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.299
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.201
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.139
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.261
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.63
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.2
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.