#VU93762 Incorrect calculation in Linux kernel


Published: 2024-07-04

Vulnerability identifier: #VU93762

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26645

CWE-ID: CWE-682

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b
http://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c
http://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860
http://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177
http://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a
http://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7
http://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb
http://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7
http://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
http://lists.debian.org/debian-lts-announce/2024/06/msg00020.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability