Vulnerability identifier: #VU104414
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rt5645_i2c_remove() function in sound/soc/codecs/rt5645.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/061a6159cea583f1155f67d1915917a6b9282662
https://git.kernel.org/stable/c/0941150100173d4eaf3fe08ff4b16740e7c3026f
https://git.kernel.org/stable/c/1a5a3dfd9f172dcb115072f0aea5e27d3083c20e
https://git.kernel.org/stable/c/236d29c5857f02e0a53fdf15d3dce1536c4322ce
https://git.kernel.org/stable/c/2def44d3aec59e38d2701c568d65540783f90f2f
https://git.kernel.org/stable/c/453f0920ffc1a28e28ddb9c3cd5562472b2895b0
https://git.kernel.org/stable/c/7d801e807536a9a9c2146c5f4a5836f154517ed3
https://git.kernel.org/stable/c/88c09e4812d72c3153afc8e5a45ecac2d0eae3ff
https://git.kernel.org/stable/c/abe7554da62cb489712a54de69ef5665c250e564
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.