Vulnerability identifier: #VU98888
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ether3_remove() function in drivers/net/ethernet/seeq/ether3.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/338a0582b28e69460df03af50e938b86b4206353
https://git.kernel.org/stable/c/822c7bb1f6f8b0331e8d1927151faf8db3b33afd
https://git.kernel.org/stable/c/1c57d61a43293252ad732007c7070fdb112545fd
https://git.kernel.org/stable/c/d2abc379071881798d20e2ac1d332ad855ae22f3
https://git.kernel.org/stable/c/516dbc6d16637430808c39568cbb6b841d32b55b
https://git.kernel.org/stable/c/77a77331cef0a219b8dd91361435eeef04cb741c
https://git.kernel.org/stable/c/b5109b60ee4fcb2f2bb24f589575e10cc5283ad4
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.