Integer overflow in Linux kernel

Vulnerability identifier: #VU100196

Vulnerability risk: Low

CVSSv3.1:

6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID:

CVE-2024-50253

CWE-ID:

CWE-190

Exploitation vector:
Local

Exploit availability:

No

Vulnerable software:


Linux kernel
Operating systems & Components /
Operating system

Vendor:

Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the __aligned() and bpf_iter_bits_new() functions in kernel/bpf/helpers.c. A local user can execute arbitrary code.

Mitigation
Install update from vendor’s website.

Vulnerable software versions

Linux kernel:


External links
git.kernel.org/stable/c/c9539e09c67880ecd88b51188c346a2cc078b06c
git.kernel.org/stable/c/393397fbdcad7396639d7077c33f86169184ba99


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

Read more here: Source link