First published: Fri Feb 23 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DISCARD ITS command. The root of the problem is that vgic_its_check_cache() does not elevate the refcount on the vgic_irq before dropping the lock that serializes refcount changes. Have vgic_its_check_cache() raise the refcount on the returned vgic_irq and add the corresponding decrement after queueing the interrupt.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
Linux kernel | >=5.4<5.4.269 | |
Linux kernel | >=5.5<5.10.209 | |
Linux kernel | >=5.11<5.15.148 | |
Linux kernel | >=5.16<6.1.75 | |
Linux kernel | >=6.2<6.6.14 | |
Linux kernel | >=6.7<6.7.2 | |
Debian | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26598 has a medium severity due to the potential use-after-free vulnerability in the KVM component of the Linux kernel.
To fix CVE-2024-26598, upgrade to the patched versions of the kernel available in your distribution, such as kernel version 6.8 or specific Debian packages like 5.10.223-1.
CVE-2024-26598 affects various distributions of Linux, including Red Hat and Debian, across multiple version ranges.
CVE-2024-26598 impacts the KVM component of the Linux kernel, specifically the virtual generic interrupt controller (VGIC) related to large physical interrupt (LPI) translation cache.
CVE-2024-26598 was reported in 2024 and was resolved shortly thereafter in subsequent kernel updates.