Updated: 2024-07-24 14:09:49.310259
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_limit: reject configurations that cause integer overflow Reject bogus configs where internal token counter wraps around. This only occurs with very very large requests, such as 17gbyte/s. Its better to reject this rather than having incorrect ratelimit.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | NONE | 0 |
CVSS Version 3.x | HIGH | 7.1 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.1 | HIGH | Released | CLSA-2024:1722533082 | 2024-08-01 14:28:51 | |
AlmaLinux 9.2 FIPS | kernel | 5.14.0 | 7.1 | HIGH | Released | CLSA-2024:1722530110 | 2024-08-01 14:28:51 | |
CentOS 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Not Vulnerable | 2024-07-31 14:29:34 | ||
CentOS 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2024:1724693366 | 2024-09-09 12:18:22 | |
CentOS 8.4 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | CLSA-2024:1725872696 | 2024-09-09 05:28:05 | |
CentOS 8.5 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | CLSA-2024:1725876080 | 2024-09-09 12:18:26 | |
CentOS Stream 8 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | CLSA-2024:1725871927 | 2024-09-09 05:28:04 | |
CloudLinux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Not Vulnerable | 2024-07-31 14:29:33 | ||
CloudLinux 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Needs Triage | 2024-07-24 14:09:59 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.1 | HIGH | Not Vulnerable | 2024-07-31 14:29:33 |