#VU90228 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90228

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52491

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mtk_jpeg_dec_device_run() function in drivers/media/platform/mtk-jpeg/mtk_jpeg_core.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/43872f44eee6c6781fea1348b38885d8e78face9
http://git.kernel.org/stable/c/1b1036c60a37a30caf6759a90fe5ecd06ec35590
http://git.kernel.org/stable/c/9fec4db7fff54d9b0306a332bab31eac47eeb5f6
http://git.kernel.org/stable/c/8254d54d00eb6cdb8367399c7f912eb8d354ecd7
http://git.kernel.org/stable/c/6e2f37022f0fc0893da4d85a0500c9d547fffd4c
http://git.kernel.org/stable/c/206c857dd17d4d026de85866f1b5f0969f2a109e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability