#VU93762 Incorrect calculation in Linux kernel - CVE-2024-26645


Vulnerability identifier: #VU93762

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26645

CWE-ID: CWE-682

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b
https://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c
https://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860
https://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177
https://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a
https://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7
https://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb
https://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability