Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-50192 |
CWE-ID | CWE-399 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU100144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50192
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the its_build_vmapp_cmd(), its_vpe_set_affinity() and its_vpe_init() functions in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.10 - 6.11.4
CPE2.3https://git.kernel.org/stable/c/b7d7b7fc876f836f40bf48a87e07ea18756ba196
https://git.kernel.org/stable/c/755b9532c885b8761fb135fedcd705e21e61cccb
https://git.kernel.org/stable/c/64b12b061c5488e2d69e67c4eaae5da64fd30bfe
https://git.kernel.org/stable/c/01282ab5182f85e42234df2ff42f0ce790f465ff
https://git.kernel.org/stable/c/d960505a869e66184fff97fb334980a5b797c7c6
https://git.kernel.org/stable/c/1442ee0011983f0c5c4b92380e6853afb513841a
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.228
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.169
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.114
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.5
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.58
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.