Linux Kernel Vulnerable to Dangling Pointer via Garbage Collector Racing Against Connect() in AF_UNIX Module
35818
10 June 2025
10 June 2025
CLOSED
MEDIUM
6.1 Medium - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-26923
Brocade Security Advisory ID |
BSA-2025-2822 |
Component |
Linux |
|
|
Summary
The Linux Kernel is vulnerable to a race condition in the AF_UNIX garbage collector due to improper handling of socket connections. This could allow an attacker to cause memory corruption.
Products Affected
- Brocade Fabric OS versions before 9.2.2a
- All versions of Brocade SANnav base OS (OVA deployment) before 2.3.1b and 2.4.0
Products Under Investigation
- Brocade ASCG base OS (OVA deployment) versions
Products Not Affected
- Brocade SANnav standard deployments are not affected by this vulnerability
[VEX Justification: Vulnerable_code_cannot_be_contolled_by_adversary] - Brocade ASCG standard deployments are not affected by this vulnerability
[VEX Justification: Vulnerable_code_cannot_be_contolled_by_adversary]
Solution
- Security update provided in Brocade Fabric OS 9.2.2a
- Security update provided in Brocade SANnav base OS (OVA deployment) 2.3.1b
- SANnav base OS Security update also provided in the sannav_ova_8x_os OVA patch which can be applied to SANnav OVA releases starting with 2.3.0
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
June 10, 2025 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.