#VU92953 Buffer overflow in Linux kernel


Published: 2024-06-20

Vulnerability identifier: #VU92953

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38579

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the spu2_dump_omd() function in drivers/crypto/bcm/spu2.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434
http://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b
http://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6
http://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd
http://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd
http://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0
http://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5
http://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57
http://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability