Vulnerability identifier: #VU94326
Vulnerability risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/c7b8c2d06e437639694abe76978e915cfb73f428
http://git.kernel.org/stable/c/dfc896c4a75cb8cd7cb2dfd9b469cf1e3f004254
http://git.kernel.org/stable/c/42725e5c1b181b757ba11d804443922982334d9b
http://git.kernel.org/stable/c/cd5ec3ee52ce4b7e283cc11facfa420c297c8065
http://git.kernel.org/stable/c/fbf4ace39b2e4f3833236afbb2336edbafd75eee
http://git.kernel.org/stable/c/ef047411887ff0845afd642d6a687819308e1a4e
http://git.kernel.org/stable/c/7e1f989055622fd086c5dfb291fc72adf5660b6f
http://git.kernel.org/stable/c/fc80fc2d4e39137869da3150ee169b40bf879287
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.