-

CVE-2024-26926

In the Linux kernel, the following vulnerability has been resolved:

binder: check offset alignment in binder_get_object()

Commit 6d98eb95b450 ("binder: avoid potential data leakage when copying
txn") introduced changes to how binder objects are copied. In doing so,
it unintentionally removed an offset alignment check done through calls
to binder_alloc_copy_from_buffer() -> check_buffer().

These calls were replaced in binder_get_object() with copy_from_user(),
so now an explicit offset alignment check is needed here. This avoids
later complications when unwinding the objects gets harder.

It is worth noting this check existed prior to commit 7a67a39320df
("binder: add function to copy binder object from buffer"), likely
removed due to redundancy at the time.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorlinux
Product linux_kernel
Default Statusunaffected
Version < 68a28f551e46
Version c056a6ba35e0
Status affected
Version < 48a1f83ca9c6
Version 23e9d815fad8
Status affected
Version < a2fd6dbc98be
Version 7a9ad4aceb02
Status affected
Version < a6d2a8b211c8
Version 6d98eb95b450
Status affected
Version < 1d7f1049035b
Version 6d98eb95b450
Status affected
Version < f01d66190457
Version 6d98eb95b450
Status affected
Version < aaef73821a3b
Version 6d98eb95b450
Status affected
Vendorlinux
Product linux_kernel
Default Statusaffected
Version 5.17
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.3% 0.529
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string