#VU93244 Buffer overflow in Linux kernel


Published: 2024-06-25

Vulnerability identifier: #VU93244

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26659

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the process_isoc_td() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/696e4112e5c1ee61996198f0ebb6ca3fab55166e
http://git.kernel.org/stable/c/2aa7bcfdbb46241c701811bbc0d64d7884e3346c
http://git.kernel.org/stable/c/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3
http://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97
http://git.kernel.org/stable/c/418456c0ce56209610523f21734c5612ee634134
http://git.kernel.org/stable/c/7c4650ded49e5b88929ecbbb631efb8b0838e811


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability