First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: virtio/akcipher - Fix stack overflow on memcpy sizeof(struct virtio_crypto_akcipher_session_para) is less than sizeof(struct virtio_crypto_op_ctrl_req::u), copying more bytes from stack variable leads stack overflow. Clang reports this issue by commands: make -j CC=clang-14 mrproper >/dev/null 2>&1 make -j O=/tmp/crypto-build CC=clang-14 allmodconfig >/dev/null 2>&1 make -j O=/tmp/crypto-build W=1 CC=clang-14 drivers/crypto/virtio/ virtio_crypto_akcipher_algs.o
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.10.209<5.10.212 | |
Linux Kernel | >=5.18<6.1.80 | |
Linux Kernel | >=6.2<6.6.19 | |
Linux Kernel | >=6.7<6.7.7 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26753 has been classified as a high severity vulnerability due to the potential for stack overflow.
To mitigate CVE-2024-26753, update your Linux kernel to the latest version that addresses this vulnerability.
CVE-2024-26753 affects various versions of the Linux kernel ranging from 5.10.209 to 6.8-rc5.
CVE-2024-26753 is a stack overflow vulnerability in the Linux kernel's crypto: virtio/akcipher module.
Yes, CVE-2024-26753 can potentially be exploited remotely by an attacker to cause a denial of service.