#VU94326 Use-after-free in Linux kernel


Vulnerability identifier: #VU94326

Vulnerability risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52885

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/c7b8c2d06e437639694abe76978e915cfb73f428
http://git.kernel.org/stable/c/dfc896c4a75cb8cd7cb2dfd9b469cf1e3f004254
http://git.kernel.org/stable/c/42725e5c1b181b757ba11d804443922982334d9b
http://git.kernel.org/stable/c/cd5ec3ee52ce4b7e283cc11facfa420c297c8065
http://git.kernel.org/stable/c/fbf4ace39b2e4f3833236afbb2336edbafd75eee
http://git.kernel.org/stable/c/ef047411887ff0845afd642d6a687819308e1a4e
http://git.kernel.org/stable/c/7e1f989055622fd086c5dfb291fc72adf5660b6f
http://git.kernel.org/stable/c/fc80fc2d4e39137869da3150ee169b40bf879287


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability