#VU91424 Integer overflow in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91424

Vulnerability risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52683

CWE-ID: CWE-190

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the lpit_update_residency() function in drivers/acpi/acpi_lpit.c. A local user can execute arbitrary code.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee
http://git.kernel.org/stable/c/6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad
http://git.kernel.org/stable/c/f39c3d578c7d09a18ceaf56750fc7f20b02ada63
http://git.kernel.org/stable/c/c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1
http://git.kernel.org/stable/c/72222dfd76a79d9666ab3117fcdd44ca8cd0c4de
http://git.kernel.org/stable/c/d1ac288b2742aa4af746c5613bac71760fadd1c4
http://git.kernel.org/stable/c/b7aab9d906e2e252a7783f872406033ec49b6dae
http://git.kernel.org/stable/c/56d2eeda87995245300836ee4dbd13b002311782


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability