Vulnerability identifier: #VU89840
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26885
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the dev_map_init_map() function in kernel/bpf/devmap.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/225da02acdc97af01b6bc6ce1a3e5362bf01d3fb
https://git.kernel.org/stable/c/c826502bed93970f2fd488918a7b8d5f1d30e2e3
https://git.kernel.org/stable/c/edf7990baa48de5097daa9ac02e06cb4c798a737
https://git.kernel.org/stable/c/250051acc21f9d4c5c595e4fcb55986ea08c4691
https://git.kernel.org/stable/c/22079b3a423382335f47d9ed32114e6c9fe88d7c
https://git.kernel.org/stable/c/e89386f62ce9a9ab9a94835a9890883c23d9d52c
https://git.kernel.org/stable/c/281d464a34f540de166cee74b723e97ac2515ec3
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.