#VU90165 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90165

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35791

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svm_register_enc_region() function in arch/x86/kvm/svm/sev.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/2d13b79640b147bd77c34a5998533b2021a4122d
http://git.kernel.org/stable/c/e126b508ed2e616d679d85fca2fbe77bb48bbdd7
http://git.kernel.org/stable/c/4868c0ecdb6cfde7c70cf478c46e06bb9c7e5865
http://git.kernel.org/stable/c/12f8e32a5a389a5d58afc67728c76e61beee1ad4
http://git.kernel.org/stable/c/f6d53d8a2617dd58c89171a6b9610c470ebda38a
http://git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability