First published: Wed Apr 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix password opcode ordering for workstations The Lenovo workstations require the password opcode to be run before the attribute value is changed (if Admin password is enabled). Tested on some Thinkpads to confirm they are OK with this order too.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.17<6.7.7 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26836 is considered a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2024-26836, update your Linux kernel to the latest stable version that includes the security patch for this vulnerability.
CVE-2024-26836 affects specific versions of the Linux kernel including versions 5.17 to 6.7.7 and 6.8-rc1 to 6.8-rc5.
CVE-2024-26836 involves an issue with password opcode ordering in Lenovo workstations when an Admin password is enabled.
Yes, CVE-2024-26836 specifically impacts Lenovo workstations that utilize certain configurations of the Linux kernel.