#VU91098 Out-of-bounds read in Linux kernel - CVE-2024-26791


Vulnerability identifier: #VU91098

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26791

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the btrfs_check_replace_dev_names() and btrfs_dev_replace_by_ioctl() functions in fs/btrfs/dev-replace.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/11d7a2e429c02d51e2dc90713823ea8b8d3d3a84
https://git.kernel.org/stable/c/c6652e20d7d783d060fe5f987eac7b5cabe31311
https://git.kernel.org/stable/c/2886fe308a83968dde252302884a1e63351cf16d
https://git.kernel.org/stable/c/ab2d68655d0f04650bef09fee948ff80597c5fb9
https://git.kernel.org/stable/c/f590040ce2b712177306b03c2a63b16f7d48d3c8
https://git.kernel.org/stable/c/b1690ced4d2d8b28868811fb81cd33eee5aefee1
https://git.kernel.org/stable/c/343eecb4ff49a7b1cc1dfe86958a805cf2341cfb
https://git.kernel.org/stable/c/9845664b9ee47ce7ee7ea93caf47d39a9d4552c4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability