#VU101927 Buffer overflow in Linux kernel - CVE-2024-53148


Vulnerability identifier: #VU101927

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53148

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the comedi_mmap() function in drivers/comedi/comedi_fops.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/16c507df509113c037cdc0ba642b9ab3389bd26c
https://git.kernel.org/stable/c/297f14fbb81895f4ccdb0ad25d196786d6461e00
https://git.kernel.org/stable/c/57f048c2d205b85e34282a9b0b0ae177e84c2f44
https://git.kernel.org/stable/c/8797b7712de704dc231f9e821d8eb3b9aeb3a032
https://git.kernel.org/stable/c/9b07fb464eb69a752406e78e62ab3a60bfa7b00d
https://git.kernel.org/stable/c/b9322408d83accc8b96322bc7356593206288c56
https://git.kernel.org/stable/c/c6963a06ce5c61d3238751ada04ee1569663a828
https://git.kernel.org/stable/c/ce8f9fb651fac95dd41f69afe54d935420b945bd


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability