CVE-2024-26816
MEDIUMLinux Kernel < 4.19.311 - Resource Allocation Without Limits
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry point. This information is used prior to booting the kernel, so relocations are not useful. In fact, performing relocations against the .notes section means that the KASLR base is exposed since /sys/kernel/notes is world-readable. To avoid leaking the KASLR base without breaking unprivileged tools that are expecting to read /sys/kernel/notes, skip performing relocations in the .notes section. The values readable in .notes are then identical to those found in System.map.
References (11)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
4.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-770
Status
published
Affected Products (10)
linux/linux_kernel
< 4.19.311
debian/debian_linux
linux/Kernel
< 4.19.311linux
linux/Kernel
< 5.4.273linux
linux/Kernel
< 5.10.214linux
linux/Kernel
< 5.15.153linux
linux/Kernel
< 6.1.83linux
linux/Kernel
< 6.6.23linux
linux/Kernel
< 6.7.11linux
linux/Kernel
< 6.8.2linux
Timeline
Published
Apr 10, 2024
Tracked Since
Feb 18, 2026