#VU102029 Use-after-free in Linux kernel - CVE-2024-56642


Vulnerability identifier: #VU102029

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56642

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415
https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359
https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6
https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa
https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd
https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f
https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability