Vulnerability identifier: #VU102069
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/0f67ca2a80acf8b207240405b7f72d660665d3df
https://git.kernel.org/stable/c/27aabf27fd014ae037cc179c61b0bee7cff55b3d
https://git.kernel.org/stable/c/7b277bd569bb6a2777f0014f84b4344f444fd49d
https://git.kernel.org/stable/c/91e2a2e4d1336333804cd31162984f01ad8cc70f
https://git.kernel.org/stable/c/a9584c897d1cba6265c78010bbb45ca5722c88bc
https://git.kernel.org/stable/c/de5a44f351ca7efd9add9851b218f5353e2224b7
https://git.kernel.org/stable/c/fb91ce37dc9a37ea23cf32b6d7b667004e93d4c5
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.