Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-26787 |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU89239
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26787
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output within the sdmmc_idma_start() function in drivers/mmc/host/mmci_stm32_sdmmc.c. A local user can gain access to sensitive information.
Install updates from vendor's website.
Vulnerable software versionsLinux kernel: 5.10 - 6.8 rc5
CPE2.3https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53
https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c
https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef
https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4
https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85
https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.213
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.152
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.81
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.21
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.