In the Linux kernel, the following vulnerability has been resolved:
binder: check offset alignment in binder_get_object()
Commit 6d98eb95b450 ("binder: avoid potential data leakage when copying
txn") introduced changes to how binder objects are copied. In doing so,
it unintentionally removed an offset alignment check done through calls
to binder_alloc_copy_from_buffer() -> check_buffer().
These calls were replaced in binder_get_object() with copy_from_user(),
so now an explicit offset alignment check is needed here. This avoids
later complications when unwinding the objects gets harder.
It is worth noting this check existed prior to commit 7a67a39320df
("binder: add function to copy binder object from buffer"), likely
removed due to redundancy at the time.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/1d7f1049035b2060342f11eff957cf567d810bdc - Patch | |
| References | () https://git.kernel.org/stable/c/48a1f83ca9c68518b1a783c62e6a8223144fa9fc - Patch | |
| References | () https://git.kernel.org/stable/c/68a28f551e4690db2b27b3db716c7395f6fada12 - Patch | |
| References | () https://git.kernel.org/stable/c/a2fd6dbc98be1105a1d8e9e31575da8873ef115c - Patch | |
| References | () https://git.kernel.org/stable/c/a6d2a8b211c874971ee4cf3ddd167408177f6e76 - Patch | |
| References | () https://git.kernel.org/stable/c/aaef73821a3b0194a01bd23ca77774f704a04d40 - Patch | |
| References | () https://git.kernel.org/stable/c/f01d6619045704d78613b14e2e0420bfdb7f1c15 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
21 Nov 2024, 09:03
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/1d7f1049035b2060342f11eff957cf567d810bdc - | |
| References | () https://git.kernel.org/stable/c/48a1f83ca9c68518b1a783c62e6a8223144fa9fc - | |
| References | () https://git.kernel.org/stable/c/68a28f551e4690db2b27b3db716c7395f6fada12 - | |
| References | () https://git.kernel.org/stable/c/a2fd6dbc98be1105a1d8e9e31575da8873ef115c - | |
| References | () https://git.kernel.org/stable/c/a6d2a8b211c874971ee4cf3ddd167408177f6e76 - | |
| References | () https://git.kernel.org/stable/c/aaef73821a3b0194a01bd23ca77774f704a04d40 - | |
| References | () https://git.kernel.org/stable/c/f01d6619045704d78613b14e2e0420bfdb7f1c15 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 May 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Apr 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Apr 2024, 13:18
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
25 Apr 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-25 06:15
Updated : 2025-12-23 18:53
NVD link : CVE-2024-26926
Mitre link : CVE-2024-26926
CVE.ORG link : CVE-2024-26926
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
