#VU90213 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90213

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26748

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cdns3_gadget_giveback() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7
http://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48
http://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8
http://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c
http://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019
http://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3
http://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability