SB20240531530 - NULL pointer dereference in Linux kernel net
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2024-26611)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bpf_sk_base_func_proto(), bpf_xdp_frags_increase_tail() and bpf_xdp_frags_shrink_tail() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/82ee4781b8200e44669a354140d5c6bd966b8768
- https://git.kernel.org/stable/c/5cd781f7216f980207af09c5e0e1bb1eda284540
- https://git.kernel.org/stable/c/c5114710c8ce86b8317e9b448f4fd15c711c2a82
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8