CVE-2024-26964 Affecting kernel-rt-modules package, versions <0:4.18.0-553.5.1.rt7.346.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-KERNELRTMODULES-6769310
- published 2 May 2024
- disclosed 1 May 2024
Introduced: 1 May 2024
CVE-2024-26964 Open this link in a new tabHow to fix?
Upgrade Centos:8
kernel-rt-modules
to version 0:4.18.0-553.5.1.rt7.346.el8_10 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-modules
package and not the kernel-rt-modules
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
usb: xhci: Add error handling in xhci_map_urb_for_dma
Currently xhci_map_urb_for_dma() creates a temporary buffer and copies the SG list to the new linear buffer. But if the kzalloc_node() fails, then the following sg_pcopy_to_buffer() can lead to crash since it tries to memcpy to NULL pointer.
So return -ENOMEM if kzalloc returns null pointer.
References
- https://access.redhat.com/security/cve/CVE-2024-26964
- https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd
- https://git.kernel.org/stable/c/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4
- https://git.kernel.org/stable/c/7b6cc33593d7ccfc3011b290849cfa899db46757
- https://git.kernel.org/stable/c/962300a360d24c5be5a188cda48da58a37e4304d
- https://git.kernel.org/stable/c/b2c898469dfc388f619c6c972a28466cbb1442ea
- https://git.kernel.org/stable/c/be95cc6d71dfd0cba66e3621c65413321b398052