NA

CVE-2024-26601

Published: 26/02/2024 Updated: 17/04/2024
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A flaw was found in the smb client in the Linux kernel. A potential out-of-bounds error was seen in the smb2_parse_contexts() function. Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). (CVE-2023-52434) A vulnerability exists in the Linux kernel's IPv4 networking stack. Under certain conditions, MPTCP and NetLabel can be configured in a way that triggers a double free memory error in net/ipv4/af_inet.c:inet_sock_destruct(). This may lead to a system crash, denial of service, or potential arbitrary code execution. (CVE-2024-1627) In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundantmb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based oncode in mb_free_blocks(), fast commit replay can end up marking as freeblocks that are already marked as such. This causes corruption of thebuddy bitmap so we need to regenerate it in that case. (CVE-2024-26601)

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

A flaw was found in the smb client in the Linux kernel A potential out-of-bounds error was seen in the smb2_parse_contexts() function Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts() (CVE-2023-52434) A vulnerability was discovered in the Linux kernel's IPv4 networking stack Under certain conditions, MPT ...
A flaw was found in the smb client in the Linux kernel A potential out-of-bounds error was seen in the smb2_parse_contexts() function Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts() (CVE-2023-52434) A vulnerability was discovered in the Linux kernel's IPv4 networking stack Under certain conditions, MPT ...
Description<!---->This CVE is under investigation by Red Hat Product Security ...