Vulnerability identifier: #VU98867
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/e52f933598b781d291b9297e39c463536da0e185
https://git.kernel.org/stable/c/cafcc1bd62934547c76abf46c6d0d54f135006fe
https://git.kernel.org/stable/c/a5401d4c3e2a3d25643c567d26e6de327774a2c9
https://git.kernel.org/stable/c/8fe117790b37c84c651e2bad9efc0e7fda73c0e3
https://git.kernel.org/stable/c/5d949ea75bb529ea6342e83465938a3b0ac51238
https://git.kernel.org/stable/c/915ac3630488af0ca194dc63b86d99802b4f6e18
https://git.kernel.org/stable/c/c26ab35702f8cd0cdc78f96aa5856bfb77be798f
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.