#VU97501 Use-after-free in Linux kernel - CVE-2024-46800


Vulnerability identifier: #VU97501

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46800

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/f0bddb4de043399f16d1969dad5ee5b984a64e7b
http://git.kernel.org/stable/c/295ad5afd9efc5f67b86c64fce28fb94e26dc4c9
http://git.kernel.org/stable/c/98c75d76187944296068d685dfd8a1e9fd8c4fdc
http://git.kernel.org/stable/c/14f91ab8d391f249b845916820a56f42cf747241
http://git.kernel.org/stable/c/db2c235682913a63054e741fe4e19645fdf2d68e
http://git.kernel.org/stable/c/dde33a9d0b80aae0c69594d1f462515d7ff1cb3d
http://git.kernel.org/stable/c/32008ab989ddcff1a485fa2b4906234c25dc5cd6
http://git.kernel.org/stable/c/3b3a2a9c6349e25a025d2330f479bc33a6ccb54a


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability