Vulnerability identifier: #VU106956
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lec_send() function in net/atm/lec.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 6.13, 6.13.1, 6.13.2, 6.13.3, 6.13.4, 6.13.5, 6.13.6, 6.13.7, 6.13.8
External links
https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb
https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c
https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730
https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3
https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.9
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.