First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.3<6.6.19 | |
Linux Kernel | >=6.7<6.7.7 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26734 is classified as a medium severity vulnerability within the Linux kernel.
To fix CVE-2024-26734, update your Linux kernel to the latest patched version or apply the appropriate security updates.
CVE-2024-26734 affects multiple versions of the Linux kernel, specifically those between 6.3 and 6.6.19, as well as 6.8-rc1 to 6.8-rc5.
CVE-2024-26734 is a use-after-free and memory leak vulnerability occurring in the devlink_init() function.
Yes, CVE-2024-26734 poses a risk of exploitation that could potentially allow an attacker to execute arbitrary code in the kernel context.