#VU94296 Buffer overflow in Linux kernel


Vulnerability identifier: #VU94296

Vulnerability risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-40902

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
http://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
http://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
http://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
http://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
http://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
http://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
http://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability