Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52918 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU99254
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cx23885_video_register() function in drivers/media/pci/cx23885/cx23885-video.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.19 - 6.6.47
CPE2.3https://git.kernel.org/stable/c/8e31b096e2e1949bc8f0be019c9ae70d414404c6
https://git.kernel.org/stable/c/199a42fc4c45e8b7f19efeb15dbc36889a599ac2
https://git.kernel.org/stable/c/e7385510e2550a9f8b6f3d5f33c5b894ab9ba976
https://git.kernel.org/stable/c/a5f1d30c51c485cec7a7de60205667c3ff86c303
https://git.kernel.org/stable/c/06ee04a907d64ee3910fecedd05d7f1be4b1b70e
https://git.kernel.org/stable/c/b1397fb4a779fca560c43d2acf6702d41b4a495b
https://git.kernel.org/stable/c/15126b916e39b0cb67026b0af3c014bfeb1f76b3
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.321
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.225
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.166
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.283
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.107
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.48
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.