Vulnerability identifier: #VU112193
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cpu_to_le16(), hidg_setup() and hidg_bind() functions in drivers/usb/gadget/function/f_hid.c, within the usbhid_parse() function in drivers/hid/usbhid/hid-core.c, within the mousevsc_on_receive_device_info() function in drivers/hid/hid-hyperv.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0
https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb
https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf
https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e
https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de
https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b
https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345
https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?