#VU92951 Buffer overflow in Linux kernel - CVE-2024-27414


Vulnerability identifier: #VU92951

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27414

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the rtnl_bridge_setlink() function in net/core/rtnetlink.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/b9fbc44159dfc3e9a7073032752d9e03f5194a6f
http://git.kernel.org/stable/c/882a51a10ecf24ce135d573afa0872aef02c5125
http://git.kernel.org/stable/c/a1227b27fcccc99dc44f912b479e01a17e2d7d31
http://git.kernel.org/stable/c/f2261eb994aa5757c1da046b78e3229a3ece0ad9
http://git.kernel.org/stable/c/167d8642daa6a44b51de17f8ff0f584e1e762db7
http://git.kernel.org/stable/c/831bc2728fb48a8957a824cba8c264b30dca1425
http://git.kernel.org/stable/c/743ad091fb46e622f1b690385bb15e3cd3daf874


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability