#VU94105 Resource management error in Linux kernel


Published: 2024-07-11

Vulnerability identifier: #VU94105

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27065

CWE-ID: CWE-399

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the nf_tables_updtable() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b
http://git.kernel.org/stable/c/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005
http://git.kernel.org/stable/c/640dbf688ba955e83e03de84fbdda8e570b7cce4
http://git.kernel.org/stable/c/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7
http://git.kernel.org/stable/c/4d37f12707ee965d338028732575f0b85f6d9e4f
http://git.kernel.org/stable/c/3443e57654f90c9a843ab6a6040c10709fd033aa
http://git.kernel.org/stable/c/df257c435e51651c43b86326d112ddadda76350e
http://git.kernel.org/stable/c/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139
http://git.kernel.org/stable/c/845083249d6a392f3a88804e1669bdb936ee129f
http://lists.debian.org/debian-lts-announce/2024/06/msg00017.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability