Vulnerability identifier: #VU100202
Vulnerability risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-50251
CWE-ID:
CWE-682
Exploitation vector: Local
Exploit availability: Yes
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/a661ed364ae6ae88c2fafa9ddc27df1af2a73701
https://git.kernel.org/stable/c/ac7df3fc80fc82bcc3b1e8f6ebc0d2c435d0c534
https://git.kernel.org/stable/c/e3e608cbad376674d19a71ccd0d41804d9393f02
https://git.kernel.org/stable/c/b1d2de8a669fa14c499a385e056944d5352b3b40
https://git.kernel.org/stable/c/d3217323525f7596427124359e76ea0d8fcc9874
https://git.kernel.org/stable/c/0ab3be58b45b996764aba0187b46de19b3e58a72
https://git.kernel.org/stable/c/c43e0ea848e7b9bef7a682cbc5608022d6d29d7b
https://git.kernel.org/stable/c/d5953d680f7e96208c29ce4139a0e38de87a57fe
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.