Vulnerability identifier: #VU100183
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50229
CWE-ID:
CWE-667
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_symlink() function in fs/nilfs2/namei.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/cc38c596e648575ce58bfc31623a6506eda4b94a
https://git.kernel.org/stable/c/a1686db1e59f8fc016c4c9361e2119dd206f479a
https://git.kernel.org/stable/c/c72e0df0b56c1166736dc8eb62070ebb12591447
https://git.kernel.org/stable/c/69548bb663fcb63f9ee0301be808a36b9d78dac3
https://git.kernel.org/stable/c/58c7f44c7b9e5ac7e3b1e5da2572ed7767a12f38
https://git.kernel.org/stable/c/1246d86e7bbde265761932c6e2dce28c69cdcb91
https://git.kernel.org/stable/c/9aa5d43ac4cace8fb9bd964ff6c23f599dc3cd24
https://git.kernel.org/stable/c/b3a033e3ecd3471248d474ef263aadc0059e516a
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.