SB2024111036 - Improper error handling in Linux kernel ipv6 netfilter
Published: November 10, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper error handling (CVE-ID: CVE-2024-50256)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/4f7b586aae53c2ed820661803da8ce18b1361921
- https://git.kernel.org/stable/c/fef63832317d9d24e1214cdd8f204d02ebdf8499
- https://git.kernel.org/stable/c/f85b057e34419e5ec0583a65078a11ccc1d4540a
- https://git.kernel.org/stable/c/4ed234fe793f27a3b151c43d2106df2ff0d81aac
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.116
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.60