First published: Tue Apr 02 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6 error is built from a non-linear skb we get the following splat, BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220/0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32a0 br_dev_queue_push_xmit+0x39d/0x6a0 Use skb_checksum instead of csum_partial who cannot deal with non-linear SKBs.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.210 | 5.10.210 |
redhat/kernel | <5.15.149 | 5.15.149 |
redhat/kernel | <6.1.78 | 6.1.78 |
redhat/kernel | <6.6.17 | 6.6.17 |
redhat/kernel | <6.7.5 | 6.7.5 |
redhat/kernel | <6.8 | 6.8 |
Linux Kernel | >=5.9<5.10.210 | |
Linux Kernel | >=5.11<5.15.149 | |
Linux Kernel | >=5.16<6.1.78 | |
Linux Kernel | >=6.2<6.6.17 | |
Linux Kernel | >=6.7<6.7.5 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Debian Linux | =10.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26665 is classified as a high-severity vulnerability due to its potential impact on system stability.
To remediate CVE-2024-26665, update the Linux kernel to version 5.10.210, 5.15.149, 6.1.78, 6.6.17, 6.7.5, 6.8, or any patched version provided by your Linux distribution.
CVE-2024-26665 affects Linux kernel versions prior to 5.10.210, 5.15.149, 6.1.78, 6.6.17, 6.7.5, and 6.8.
CVE-2024-26665 is associated with an out-of-bounds access vulnerability that can occur when building IPv6 PMTU errors.
CVE-2024-26665 impacts software distributions including Red Hat and Debian that utilize the affected versions of the Linux kernel.