Vulnerability identifier: #VU108866
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pidff_set_autocenter() and pidff_reports_ok() functions in drivers/hid/usbhid/hid-pidff.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 6.12, 6.12.1, 6.12.2, 6.12.3, 6.12.4, 6.12.5, 6.12.6, 6.12.7, 6.12.8, 6.12.9, 6.12.10, 6.12.11, 6.12.12, 6.12.13, 6.12.14, 6.12.15, 6.12.16, 6.12.17, 6.12.18, 6.12.19, 6.12.20, 6.12.21, 6.12.22, 6.12.23
External links
https://git.kernel.org/stable/c/22a05462c3d0eee15154faf8d13c49e6295270a5
https://git.kernel.org/stable/c/3a507184f9307e19cb441b897c49e7843c94e56b
https://git.kernel.org/stable/c/44a1b8b2027afbb37e418993fb23561bdb9efb38
https://git.kernel.org/stable/c/6b4449e4f03326fbd2136e67bfcc1e6ffe61541d
https://git.kernel.org/stable/c/be706a48bb7896d4130edc82811233d1d62158e7
https://git.kernel.org/stable/c/d230becb9d38b7325c5c38d051693e4c26b1829b
https://git.kernel.org/stable/c/ddb147885225d768025f6818df533d30edf3e102
https://git.kernel.org/stable/c/e368698da79af821f18c099520deab1219c2044b
https://git.kernel.org/stable/c/f8f4d77710e1c38f4a2bd26c88c4878b5b5e817a
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.24
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.