Vulnerability identifier: #VU99443
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mptcp_pm_nl_rm_addr_or_subflow() function in net/mptcp/pm_netlink.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/35301636439138b821f1f6169bd00d348ebd388a
https://git.kernel.org/stable/c/da3343bc0839b180fd9af9c27fa456d8231409f9
https://git.kernel.org/stable/c/7b2e478abab0b3a33515433a6af563aebba773c1
https://git.kernel.org/stable/c/a8c36ea4ef9a350816f6556c5c5b63810f84b538
https://git.kernel.org/stable/c/7decd1f5904a489d3ccdcf131972f94645681689
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.