First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and returning SHOT will lead to UaF. Move the retval override to the error path which actually need it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.19 | 6.6.19 |
redhat/kernel | <6.7.7 | 6.7.7 |
redhat/kernel | <6.8 | 6.8 |
Linux kernel | >=4.19<6.6.19 | |
Linux kernel | >=6.7<6.7.7 | |
Linux kernel | =6.8-rc1 | |
Linux kernel | =6.8-rc2 | |
Linux kernel | =6.8-rc3 | |
Linux kernel | =6.8-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26739 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-26739, update your kernel to versions 6.6.19, 6.7.7, or 6.8.
CVE-2024-26739 affects Linux kernel versions prior to 6.6.19, 6.7.7, and all pre-release versions of 6.8.
The vulnerable component in CVE-2024-26739 is the net/sched function in the Linux kernel.
Currently, the recommended solution for CVE-2024-26739 is to apply the available patches by updating the kernel.