Vulnerability identifier: #VU63385
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
Exploitation vector: Local
Exploit availability:
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor:
Description
The vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. A local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
http://seclists.org/oss-sec/2021/q4/39
http://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
http://bugzilla.redhat.com/show_bug.cgi?id=2013180
http://www.openwall.com/lists/oss-security/2021/11/05/1
http://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
http://www.debian.org/security/2022/dsa-5096
http://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?