#VU96411 Use-after-free in Linux kernel


Published: 2024-08-22

Vulnerability identifier: #VU96411

Vulnerability risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48912

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nf_register_net_hook() function in net/netfilter/core.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
http://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954
http://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
http://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
http://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
http://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
http://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability