#VU91556 Improper Initialization in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91556

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52616

CWE-ID: CWE-665

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165
http://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6
http://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598
http://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a
http://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49
http://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability