NULL pointer dereference in Linux kernel - CVE-2024-26611
Published: May 31, 2024 / Updated: May 14, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bpf_sk_base_func_proto(), bpf_xdp_frags_increase_tail() and bpf_xdp_frags_shrink_tail() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/82ee4781b8200e44669a354140d5c6bd966b8768
- https://git.kernel.org/stable/c/5cd781f7216f980207af09c5e0e1bb1eda284540
- https://git.kernel.org/stable/c/c5114710c8ce86b8317e9b448f4fd15c711c2a82
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8