SB20240604105 - Out-of-bounds read in Linux kernel proc
Published: June 4, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2023-52596)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the register_sysctl_mount_point(), insert_header() and get_links() functions in fs/proc/proc_sysctl.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/15893975e9e382f8294ea8d926f08dc2d8d39ede
- https://git.kernel.org/stable/c/2ae7081bc10123b187e36a4f3a8e53768de31489
- https://git.kernel.org/stable/c/315552310c7de92baea4e570967066569937a843
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.16
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8