SB2024090579 - Input validation error in Linux kernel char xillybus driver
Published: September 5, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2024-45007)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the MODULE_LICENSE(), cleanup_dev(), report_io_error() and xillyusb_init() functions in drivers/char/xillybus/xillyusb.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/409b495f8e3300d5fba08bc817fa8825dae48cc9
- https://git.kernel.org/stable/c/5d3567caff2a1d678aa40cc74a54e1318941fad3
- https://git.kernel.org/stable/c/a7ad105b12256ec7fb6d6d1a0e2e60f00b7da157
- https://git.kernel.org/stable/c/aa1a19724fa2c31e97a9be48baedd4692b265157
- https://git.kernel.org/stable/c/ccbde4b128ef9c73d14d0d7817d68ef795f6d131
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.166
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.107
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.48