Description
A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.
References (5)
Core 5
Core References
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2024-0607
Issue Tracking, Patch, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2258635
Scores
CVSS v3
6.6
EPSS
0.0002
EPSS Percentile
5.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-229
Status
published
Products (5)
fedoraproject/fedora
39
linux/linux_kernel
6.7 rc1
linux/linux_kernel
< 6.7
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Jan 18, 2024
Tracked Since
Feb 18, 2026