SB20240620231 - Buffer overflow in Linux kernel core
Published: June 20, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2024-27414)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the rtnl_bridge_setlink() function in net/core/rtnetlink.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/b9fbc44159dfc3e9a7073032752d9e03f5194a6f
- https://git.kernel.org/stable/c/882a51a10ecf24ce135d573afa0872aef02c5125
- https://git.kernel.org/stable/c/a1227b27fcccc99dc44f912b479e01a17e2d7d31
- https://git.kernel.org/stable/c/f2261eb994aa5757c1da046b78e3229a3ece0ad9
- https://git.kernel.org/stable/c/167d8642daa6a44b51de17f8ff0f584e1e762db7
- https://git.kernel.org/stable/c/831bc2728fb48a8957a824cba8c264b30dca1425
- https://git.kernel.org/stable/c/743ad091fb46e622f1b690385bb15e3cd3daf874
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.212
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.151
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.271
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.81
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.21
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8