Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-50296 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU100626
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-50296
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hnae3_unregister_ae_algo_prepare() function in drivers/net/ethernet/hisilicon/hns3/hnae3.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
CPE2.3 External linkshttp://git.kernel.org/stable/c/a0df055775f30850c0da8f7dab40d67c0fd63908
http://git.kernel.org/stable/c/7ae4e56de7dbd0999578246a536cf52a63f4056d
http://git.kernel.org/stable/c/590a4b2d4e0b73586e88bce9b8135b593355ec09
http://git.kernel.org/stable/c/e36482b222e00cc7aeeea772fc0cf2943590bc4d
http://git.kernel.org/stable/c/76b155e14d9b182ce83d32ada2d0d7219ea8c8dd
http://git.kernel.org/stable/c/719edd9f3372ce7fb3b157647c6658672946874b
http://git.kernel.org/stable/c/b5c94e4d947d15d521e935ff10c5a22a7883dea5
http://git.kernel.org/stable/c/df3dff8ab6d79edc942464999d06fbaedf8cdd18
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.