
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-50256 affects the Linux kernel's netfilter component, specifically in the nfrejectipv6 functionality. The vulnerability was discovered when a potential crash was identified in the nfsendreset6() function. The issue occurs when dev->hardheaderlen is zero and the system attempts to push an Ethernet header, which could lead to a system crash (Kernel Patch).
The vulnerability exists in the Linux kernel's netfilter IPv6 rejection handling code. The issue manifests when the system attempts to allocate and reserve space for a network packet header using an incorrect calculation based on dev->hardheaderlen. The CVSS v3.1 base score is 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause a kernel crash through a buffer underflow condition, leading to a denial of service. The impact is primarily on system availability, with no direct impact on confidentiality or integrity (NVD).
The issue has been fixed by replacing the use of dev->hardheaderlen with LLMAXHEADER in the allocation and reservation of packet header space. The fix has been incorporated into various Linux kernel versions, and users are advised to update to patched versions. Red Hat has released security updates addressing this vulnerability in their products (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."