Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52489 |
CWE-ID | CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU89388
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52489
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the section_deactivate() function in mm/sparse.c. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea
http://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529
http://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a
http://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97
http://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7
http://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.