#VU97495 Use-after-free in Linux kernel - CVE-2024-46781


Vulnerability identifier: #VU97495

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46781

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_finish_roll_forward() and nilfs_salvage_orphan_logs() functions in fs/nilfs2/recovery.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/35a9a7a7d94662146396199b0cfd95f9517cdd14
https://git.kernel.org/stable/c/da02f9eb333333b2e4f25d2a14967cff785ac82e
https://git.kernel.org/stable/c/07e4dc2fe000ab008bcfe90be4324ef56b5b4355
https://git.kernel.org/stable/c/8e2d1e9d93c4ec51354229361ac3373058529ec4
https://git.kernel.org/stable/c/ca92c4bff2833cb30d493b935168d6cccd5c805d
https://git.kernel.org/stable/c/9d8c3a585d564d776ee60d4aabec59b404be7403
https://git.kernel.org/stable/c/1cf1f7e8cd47244fa947d357ef1f642d91e219a3
https://git.kernel.org/stable/c/5787fcaab9eb5930f5378d6a1dd03d916d146622


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability