CVE-2024-26678
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
02/04/2024
Last modified:
17/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section<br />
<br />
The .compat section is a dummy PE section that contains the address of<br />
the 32-bit entrypoint of the 64-bit kernel image if it is bootable from<br />
32-bit firmware (i.e., CONFIG_EFI_MIXED=y)<br />
<br />
This section is only 8 bytes in size and is only referenced from the<br />
loader, and so it is placed at the end of the memory view of the image,<br />
to avoid the need for padding it to 4k, which is required for sections<br />
appearing in the middle of the image.<br />
<br />
Unfortunately, this violates the PE/COFF spec, and even if most EFI<br />
loaders will work correctly (including the Tianocore reference<br />
implementation), PE loaders do exist that reject such images, on the<br />
basis that both the file and memory views of the file contents should be<br />
described by the section headers in a monotonically increasing manner<br />
without leaving any gaps.<br />
<br />
So reorganize the sections to avoid this issue. This results in a slight<br />
padding overhead (
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787
- https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf
- https://git.kernel.org/stable/c/4adeeff8c12321cd453412a659c3c0eeb9bb2397
- https://git.kernel.org/stable/c/d327e961573fc335af0ae8a160302205327e1f4e
- https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787
- https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf
- https://git.kernel.org/stable/c/4adeeff8c12321cd453412a659c3c0eeb9bb2397
- https://git.kernel.org/stable/c/d327e961573fc335af0ae8a160302205327e1f4e



