First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address Read from an unsafe address with copy_from_kernel_nofault() in arch_adjust_kprobe_addr() because this function is used before checking the address is in text or not. Syzcaller bot found a bug and reported the case if user specifies inaccessible data area, arch_adjust_kprobe_addr() will cause a kernel panic. [ mingo: Clarified the comment. ]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.84 | 6.1.84 |
redhat/kernel | <6.6.24 | 6.6.24 |
redhat/kernel | <6.7.12 | 6.7.12 |
redhat/kernel | <6.8.3 | 6.8.3 |
redhat/kernel | <6.9 | 6.9 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26946 has been classified with a high severity level due to the potential risk of reading from unsafe memory addresses.
To fix CVE-2024-26946, update to the patched kernel versions 6.1.84, 6.6.24, 6.7.12, 6.8.3, or 6.9 for Red Hat, or to the specified versions for Debian.
CVE-2024-26946 affects multiple versions of the Linux kernel prior to the specified patched versions.
Systems running vulnerable versions of the Linux kernel, particularly those in Red Hat and Debian distributions, are at risk from CVE-2024-26946.
As of now, there is no public information indicating that CVE-2024-26946 is being actively exploited in the wild.