#VU100218 Use-after-free in Linux kernel
Published: November 11, 2024
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in net/sched/sch_atm.c within the Scheduler ATM Queuing Discipline implementation when handling traffic control. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.