#VU90079 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90079

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52803

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rpc_clnt_remove_pipedir() and rpc_setup_pipedir() functions in net/sunrpc/clnt.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46
http://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df
http://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680
http://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618
http://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a
http://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability