#VU93616 Buffer overflow in Linux kernel


Published: 2024-07-02

Vulnerability identifier: #VU93616

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52868

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the thermal_zone_bind_cooling_device() function in drivers/thermal/thermal_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8
http://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521
http://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb
http://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c
http://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c
http://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8
http://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97
http://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686
http://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability