Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-26640 |
CWE-ID | CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU89397
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26640
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLinux kernel: 5.10 - 6.8 rc5
CPE2.3https://git.kernel.org/stable/c/f48bf9a83b1666d934247cb58a9887d7b3127b6f
https://git.kernel.org/stable/c/718f446e60316bf606946f7f42367d691d21541e
https://git.kernel.org/stable/c/b383d4ea272fe5795877506dcce5aad1f6330e5e
https://git.kernel.org/stable/c/d15cc0f66884ef2bed28c7ccbb11c102aa3a0760
https://git.kernel.org/stable/c/1b8adcc0e2c584fec778add7777fe28e20781e60
https://git.kernel.org/stable/c/577e4432f3ac810049cb7e6b71f4d96ec7c6e894
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.210
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.149
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.77
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.16
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.4
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.