SB20240531251 - Out-of-bounds read in Linux kernel unix
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2024-26750)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the unix_gc() function in net/unix/garbage.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6
- https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60
- https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d
- https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787
- https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.151
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.81
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.21
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8