First published: Mon Feb 26 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: binder: signal epoll threads of self-work In (e)poll mode, threads often depend on I/O events to determine when data is ready for consumption. Within binder, a thread may initiate a command via BINDER_WRITE_READ without a read buffer and then make use of epoll_wait() or similar to consume any responses afterwards. It is then crucial that epoll threads are signaled via wakeup when they queue their own work. Otherwise, they risk waiting indefinitely for an event leaving their work unhandled. What is worse, subsequent commands won't trigger a wakeup either as the thread has pending work.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.29<4.19.307 | |
Linux Kernel | >=4.20.0<5.4.269 | |
Linux Kernel | >=5.5.0<5.10.210 | |
Linux Kernel | >=5.11.0<5.15.149 | |
Linux Kernel | >=5.16.0<6.1.79 | |
Linux Kernel | >=6.2.0<6.6.18 | |
Linux Kernel | >=6.7.0<6.7.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26606 has been classified with a high severity due to its impact on the Linux kernel's binder component.
CVE-2024-26606 affects various versions of the Linux kernel from 2.6.29 to 6.7.0.
To fix CVE-2024-26606, update your Linux kernel to the patched versions such as 5.10.223-1, 5.10.226-1, or newer.
CVE-2024-26606 impacts the binder component of the Linux kernel.
No, CVE-2024-26606 relates to vulnerabilities in signal handling for threads, not remote code execution.