Vulnerability identifier: #VU88895
Vulnerability risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-787
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor:
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the thunderx_ocx_com_threaded_isr() function in drivers/edac/thunderx_edac.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
http://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
http://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
http://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
http://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
http://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
http://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
http://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.