#VU90271 Out-of-bounds read in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90271

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36906

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ENDPROC() function in arch/arm/kernel/sleep.S. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/20ac71bee028ffbae4fc14ed679b23b4d3e95726
http://git.kernel.org/stable/c/ad702338fe423cb1e79745787090317256a98dab
http://git.kernel.org/stable/c/ee0ce7573e5083031960faf602c9db693ab5b477
http://git.kernel.org/stable/c/b26f353786d365e658cebc9a9ace88e04fc2325e
http://git.kernel.org/stable/c/c4238686f9093b98bd6245a348bcf059cdce23af


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability