Buffer overflow in Linux kernel usb host driver



Published: 2024-06-25
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-26659
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU93244

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26659

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/696e4112e5c1ee61996198f0ebb6ca3fab55166e
http://git.kernel.org/stable/c/2aa7bcfdbb46241c701811bbc0d64d7884e3346c
http://git.kernel.org/stable/c/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3
http://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97
http://git.kernel.org/stable/c/418456c0ce56209610523f21734c5612ee634134
http://git.kernel.org/stable/c/7c4650ded49e5b88929ecbbb631efb8b0838e811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###