#VU91086 Out-of-bounds read in Linux kernel - CVE-2023-52766


Vulnerability identifier: #VU91086

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52766

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df
https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b
https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6
https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65
https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability