SB2024111033 - Input validation error in Linux kernel core
Published: November 10, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2024-50258)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the NLA_POLICY_MIN() function in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/ac5977001eee7660c643f8e07a2de9001990b7b8
- https://git.kernel.org/stable/c/e72fd1389a5364bc6aa6312ecf30bdb5891b9486
- https://git.kernel.org/stable/c/9ab5cf19fb0e4680f95e506d6c544259bf1111c4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.181
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.120
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.60