Use-after-free in Linux kernel bridge



Published: 2024-08-26
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-44934
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU96517

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-44934

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the br_multicast_del_port() function in net/bridge/br_multicast.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/1e16828020c674b3be85f52685e8b80f9008f50f
http://git.kernel.org/stable/c/0d8b26e10e680c01522d7cc14abe04c3265a928f
http://git.kernel.org/stable/c/e3145ca904fa8dbfd1a5bf0187905bc117b0efce
http://git.kernel.org/stable/c/b2f794b168cf560682ff976b255aa6d29d14a658
http://git.kernel.org/stable/c/92c4ee25208d0f35dafc3213cdf355fbe449e078


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###