Privilege escalation in Linux kernel edac driver



Published: 2024-04-22
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-52464
CWE-ID CWE-787
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds write

EUVDB-ID: #VU88895

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52464

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the thunderx_ocx_com_threaded_isr() function in drivers/edac/thunderx_edac.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linux kernel: before 4.19.306

External links

http://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
http://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
http://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
http://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
http://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
http://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
http://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
http://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###