We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-4134

Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work()



Description

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.

Reserved 2023-08-03 | Published 2024-11-14 | Updated 2024-11-14 | Assigner fedora


MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Product status

dbe836576f12743a7d2d170ad4ad4fd324c4d47a before *
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2023-07-10:Reported to Red Hat.
2023-04-21:Made public.

Credits

Red Hat would like to thank Duoming Zhou for reporting this issue.

References

access.redhat.com/security/cve/CVE-2023-4134 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2221700 (RHBZ#2221700) issue-tracking

cve.org (CVE-2023-4134)

nvd.nist.gov (CVE-2023-4134)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-4134

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.