Vulnerability identifier: #VU102029
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415
https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359
https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6
https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa
https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd
https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f
https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.