#VU100202 Incorrect calculation in Linux kernel - CVE-2024-50251


| Updated: 2024-11-15

Vulnerability identifier: #VU100202

Vulnerability risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2024-50251

CWE-ID: CWE-682

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/a661ed364ae6ae88c2fafa9ddc27df1af2a73701
https://git.kernel.org/stable/c/ac7df3fc80fc82bcc3b1e8f6ebc0d2c435d0c534
https://git.kernel.org/stable/c/e3e608cbad376674d19a71ccd0d41804d9393f02
https://git.kernel.org/stable/c/b1d2de8a669fa14c499a385e056944d5352b3b40
https://git.kernel.org/stable/c/d3217323525f7596427124359e76ea0d8fcc9874
https://git.kernel.org/stable/c/0ab3be58b45b996764aba0187b46de19b3e58a72
https://git.kernel.org/stable/c/c43e0ea848e7b9bef7a682cbc5608022d6d29d7b
https://git.kernel.org/stable/c/d5953d680f7e96208c29ce4139a0e38de87a57fe


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability