Vulnerability identifier: #VU97495
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_finish_roll_forward() and nilfs_salvage_orphan_logs() functions in fs/nilfs2/recovery.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/35a9a7a7d94662146396199b0cfd95f9517cdd14
https://git.kernel.org/stable/c/da02f9eb333333b2e4f25d2a14967cff785ac82e
https://git.kernel.org/stable/c/07e4dc2fe000ab008bcfe90be4324ef56b5b4355
https://git.kernel.org/stable/c/8e2d1e9d93c4ec51354229361ac3373058529ec4
https://git.kernel.org/stable/c/ca92c4bff2833cb30d493b935168d6cccd5c805d
https://git.kernel.org/stable/c/9d8c3a585d564d776ee60d4aabec59b404be7403
https://git.kernel.org/stable/c/1cf1f7e8cd47244fa947d357ef1f642d91e219a3
https://git.kernel.org/stable/c/5787fcaab9eb5930f5378d6a1dd03d916d146622
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.