An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1997961 | issue tracking third party advisory patch |
https://lists.openwall.net/netdev/2021/08/17/124 | mailing list exploit third party advisory |
https://www.openwall.com/lists/oss-security/2021/08/27/2 | mailing list patch exploit third party advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb | patch vendor advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 | patch vendor advisory |
https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220407-0007/ | third party advisory |