#VU102280 Input validation error in Linux kernel - CVE-2024-56570


Vulnerability identifier: #VU102280

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56570

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ovl_dentry_init_flags() function in fs/overlayfs/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c
https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3
https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773
https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3
https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83
https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166
https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability