#VU91392 Out-of-bounds read in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91392

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52674

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the scarlett2_mixer_ctl_put() function in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e517645ead5ea22c69d2a44694baa23fe1ce7c2b
http://git.kernel.org/stable/c/d8d8897d65061cbe36bf2909057338303a904810
http://git.kernel.org/stable/c/03035872e17897ba89866940bbc9cefca601e572
http://git.kernel.org/stable/c/ad945ea8d47dd4454c271510bea24850119847c2
http://git.kernel.org/stable/c/04f8f053252b86c7583895c962d66747ecdc61b7


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability