Vulnerability identifier: #VU98919
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2832_pid_filter() function in drivers/media/dvb-frontends/rtl2832.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d
http://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71
http://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a
http://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835
http://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447
http://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60
http://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.