#VU97564 Buffer overflow in Linux kernel - CVE-2024-46780


Vulnerability identifier: #VU97564

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46780

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nilfs_dev_revision_show(), nilfs_dev_device_size_show(), nilfs_dev_uuid_show() and nilfs_dev_volume_name_show() functions in fs/nilfs2/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/b90beafac05931cbfcb6b1bd4f67c1923f47040e
https://git.kernel.org/stable/c/ba97ba173f9625d5f34a986088979eae8b80d38e
https://git.kernel.org/stable/c/157c0d94b4c40887329418c70ef4edd1a8d6b4ed
https://git.kernel.org/stable/c/b14e7260bb691d7f563f61da07d61e3c8b59a614
https://git.kernel.org/stable/c/19cfeba0e4b8eda51484fcf8cf7d150418e1d880
https://git.kernel.org/stable/c/8c6e43b3d5f109cf9c61bc188fcc8175404e924f
https://git.kernel.org/stable/c/962562d4c70c5cdeb4e955d63ff2017c4eca1aad
https://git.kernel.org/stable/c/683408258917541bdb294cd717c210a04381931e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability