#VU93153 Buffer overflow in Linux kernel


Published: 2024-06-24

Vulnerability identifier: #VU93153

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35823

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the vc_uniscr_delete() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/fc7dfe3d123f00e720be80b920da287810a1f37d
http://git.kernel.org/stable/c/ff7342090c1e8c5a37015c89822a68b275b46f8a
http://git.kernel.org/stable/c/1ce408f75ccf1e25b3fddef75cca878b55f2ac90
http://git.kernel.org/stable/c/0190d19d7651c08abc187dac3819c61b726e7e3f
http://git.kernel.org/stable/c/994a1e583c0c206c8ca7d03334a65b79f4d8bc51
http://git.kernel.org/stable/c/7529cbd8b5f6697b369803fe1533612c039cabda
http://git.kernel.org/stable/c/2933b1e4757a0a5c689cf48d80b1a2a85f237ff1
http://git.kernel.org/stable/c/1581dafaf0d34bc9c428a794a22110d7046d186d


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability