First published: Thu Sep 05 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the p9_fid object. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1194 is high due to its potential for privilege escalation on affected Linux Kernel installations.
To fix ZDI-24-1194, users should apply the recommended patches or updates provided by their Linux distribution.
All installations of the Linux Kernel that have not been patched are potentially affected by ZDI-24-1194.
ZDI-24-1194 can be exploited by local attackers to escalate their privileges if they already have the ability to execute low-privileged code.
Yes, ZDI-24-1194 corresponds to a specific CVE, which provides additional details on the vulnerability.