First published: Thu Feb 22 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix UAF issue in ksmbd_tcp_new_connection() The race is between the handling of a new TCP connection and its disconnection. It leads to UAF on `struct tcp_transport` in ksmbd_tcp_new_connection() function.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.15.0<5.15.149 | |
Linux Kernel | >=5.16.0<6.1.75 | |
Linux Kernel | >=6.2.0<6.6.14 | |
Linux Kernel | >=6.7.0<6.7.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26592 is classified with a medium severity due to its potential for a use-after-free condition in the Linux kernel.
To fix CVE-2024-26592, upgrade to a patched version of the Linux kernel as recommended in security advisories.
CVE-2024-26592 affects several versions of the Linux kernel, specifically versions between 5.15.0 and 5.15.149, 5.16.0 and 6.1.75, and additional ranges up to 6.7.2.
Currently, there are no recommended workarounds for CVE-2024-26592, and updating the kernel is advised.
The impact of CVE-2024-26592 could allow an attacker to execute arbitrary code or crash the system when exploiting the use-after-free vulnerability.