#VU103139 Improper privilege management in Linux kernel - CVE-2024-57931


Vulnerability identifier: #VU103139

Vulnerability risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57931

CWE-ID: CWE-269

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the services_compute_xperms_decision() function in security/selinux/ss/services.c. A local user can read and manipulate data.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/712137b177b45f255ce5687e679d950fcb218256
https://git.kernel.org/stable/c/900f83cf376bdaf798b6f5dcb2eae0c822e908b6
https://git.kernel.org/stable/c/c1dbd28a079553de0023e1c938c713efeeee400f
https://git.kernel.org/stable/c/c79324d42fa48372e0acb306a2761cc642bd4db0
https://git.kernel.org/stable/c/efefe36c03a73bb81c0720ce397659a5051b73fa
https://git.kernel.org/stable/c/f45a77dd24ae9ddb474303ec3975c376bd99fc51
https://git.kernel.org/stable/c/f70e4b9ec69d9a74b84c17767a9a4eda8c901021


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability