CVE-2024-26663 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
OSV7.0OSV6.5
EPSS
0.0%
top 94.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateAug 14
Description
In the Linux kernel, the following vulnerability has been resolved:
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
syzbot reported the following general protection fault [1]:
general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
tipc_udp_nl_bearer_add+0x212/0x…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxef20cd4dd1633987bcf46ac34ace2c8af212361f — 24ec8f0da93b8a9fba11600be8a90f0d73fb46f1+8
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
17📋Vendor Advisories
18💬Community
1Bugzilla▶
CVE-2024-26663 kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()↗2024-04-02