First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: target: pscsi: Fix bio_put() for error case As of commit 066ff571011d ("block: turn bio_kmalloc into a simple kmalloc wrapper"), a bio allocated by bio_kmalloc() must be freed by bio_uninit() and kfree(). That is not done properly for the error case, hitting WARN and NULL pointer dereference in bio_free().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=5.19<6.1.80 | |
Linux Kernel | >=6.2<6.6.19 | |
Linux Kernel | >=6.7<6.7.7 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26760 has not been assigned a specific severity rating; however, it addresses a critical fix in the Linux kernel.
To fix CVE-2024-26760, update to the latest version of the Linux kernel that contains the appropriate patches.
CVE-2024-26760 affects Linux kernel versions from 5.19 to 6.1.80 and 6.2 to 6.6.19, as well as specific release candidates.
CVE-2024-26760 is a vulnerability related to improper memory management in the SCSI target subsystem of the Linux kernel.
No specific workaround has been recommended for CVE-2024-26760; the preferred solution is to apply the necessary kernel updates.