Vulnerability identifier: #VU92951
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the rtnl_bridge_setlink() function in net/core/rtnetlink.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/b9fbc44159dfc3e9a7073032752d9e03f5194a6f
http://git.kernel.org/stable/c/882a51a10ecf24ce135d573afa0872aef02c5125
http://git.kernel.org/stable/c/a1227b27fcccc99dc44f912b479e01a17e2d7d31
http://git.kernel.org/stable/c/f2261eb994aa5757c1da046b78e3229a3ece0ad9
http://git.kernel.org/stable/c/167d8642daa6a44b51de17f8ff0f584e1e762db7
http://git.kernel.org/stable/c/831bc2728fb48a8957a824cba8c264b30dca1425
http://git.kernel.org/stable/c/743ad091fb46e622f1b690385bb15e3cd3daf874
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.