Vulnerability identifier: #VU97501
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/f0bddb4de043399f16d1969dad5ee5b984a64e7b
http://git.kernel.org/stable/c/295ad5afd9efc5f67b86c64fce28fb94e26dc4c9
http://git.kernel.org/stable/c/98c75d76187944296068d685dfd8a1e9fd8c4fdc
http://git.kernel.org/stable/c/14f91ab8d391f249b845916820a56f42cf747241
http://git.kernel.org/stable/c/db2c235682913a63054e741fe4e19645fdf2d68e
http://git.kernel.org/stable/c/dde33a9d0b80aae0c69594d1f462515d7ff1cb3d
http://git.kernel.org/stable/c/32008ab989ddcff1a485fa2b4906234c25dc5cd6
http://git.kernel.org/stable/c/3b3a2a9c6349e25a025d2330f479bc33a6ccb54a
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.