First published: Tue Jan 23 2024(Updated: )
copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=6.7.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23851 is categorized as a critical vulnerability due to its potential to cause system crashes.
To fix CVE-2024-23851, upgrade to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2024-23851 affects the Linux kernel versions up to and including 6.7.1.
CVE-2024-23851 involves the copy_params function in drivers/md/dm-ioctl.c related to missing data_size checks.
CVE-2024-23851 primarily causes local crashes rather than remote exploitation.