Use-after-free in Linux kernel platform mtk-jpeg driver



Published: 2024-05-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-52491
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU90228

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52491

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mtk_jpeg_dec_device_run() function in drivers/media/platform/mtk-jpeg/mtk_jpeg_core.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/43872f44eee6c6781fea1348b38885d8e78face9
http://git.kernel.org/stable/c/1b1036c60a37a30caf6759a90fe5ecd06ec35590
http://git.kernel.org/stable/c/9fec4db7fff54d9b0306a332bab31eac47eeb5f6
http://git.kernel.org/stable/c/8254d54d00eb6cdb8367399c7f912eb8d354ecd7
http://git.kernel.org/stable/c/6e2f37022f0fc0893da4d85a0500c9d547fffd4c
http://git.kernel.org/stable/c/206c857dd17d4d026de85866f1b5f0969f2a109e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###