#VU100732 Integer overflow in Linux kernel - CVE-2024-53081


Vulnerability identifier: #VU100732

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53081

CWE-ID: CWE-190

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the calc_pll() function in drivers/media/i2c/ar0521.c. A local user can execute arbitrary code.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/5e1523076acf95b4ea68d19b6f27e6891267cc24
https://git.kernel.org/stable/c/a244b82d0ae60326901f2b50c15e3118298b7ecd
https://git.kernel.org/stable/c/97ed0c0332d5525653668b31acf62ff1e6b50784
https://git.kernel.org/stable/c/438d3085ba5b8b5bfa5290faa594e577f6ac9aa7


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability