-
CVE-2024-26926
- EPSS 0.3%
- Published 25.04.2024 06:15:57
- Last modified 21.11.2024 09:03:24
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: binder: check offset alignment in binder_get_object() Commit 6d98eb95b450 ("binder: avoid potential data leakage when copying txn") introduced changes to how binder objects are copied. In doing so, it unintentionally removed an offset alignment check done through calls to binder_alloc_copy_from_buffer() -> check_buffer(). These calls were replaced in binder_get_object() with copy_from_user(), so now an explicit offset alignment check is needed here. This avoids later complications when unwinding the objects gets harder. It is worth noting this check existed prior to commit 7a67a39320df ("binder: add function to copy binder object from buffer"), likely removed due to redundancy at the time.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorlinux
≫
Product
linux_kernel
Default Statusunaffected
Version <
68a28f551e46
Version
c056a6ba35e0
Status
affected
Version <
48a1f83ca9c6
Version
23e9d815fad8
Status
affected
Version <
a2fd6dbc98be
Version
7a9ad4aceb02
Status
affected
Version <
a6d2a8b211c8
Version
6d98eb95b450
Status
affected
Version <
1d7f1049035b
Version
6d98eb95b450
Status
affected
Version <
f01d66190457
Version
6d98eb95b450
Status
affected
Version <
aaef73821a3b
Version
6d98eb95b450
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusaffected
Version
5.17
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.529 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|