#VU92035 Improper locking in Linux kernel - CVE-2024-26923


| Updated: 2024-07-01

Vulnerability identifier: #VU92035

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26923

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51
https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c
https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9
https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009
https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51
https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f
https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3
https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability