First published: Wed Apr 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-26872">CVE-2024-26872</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26872-2d38@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26872-2d38@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.214 | 5.10.214 |
redhat/kernel | <5.15.153 | 5.15.153 |
redhat/kernel | <6.1.83 | 6.1.83 |
redhat/kernel | <6.6.23 | 6.6.23 |
redhat/kernel | <6.7.11 | 6.7.11 |
redhat/kernel | <6.8.2 | 6.8.2 |
redhat/kernel | <6.9 | 6.9 |
Linux Kernel | >=3.3<5.10.214 | |
Linux Kernel | >=5.11<5.15.153 | |
Linux Kernel | >=5.16<6.1.83 | |
Linux Kernel | >=6.2<6.6.23 | |
Linux Kernel | >=6.7<6.7.11 | |
Linux Kernel | >=6.8<6.8.2 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26872 is classified as a medium severity vulnerability in the Linux kernel.
To mitigate CVE-2024-26872, upgrade to a patched version of the Linux kernel such as 5.10.214 or higher.
CVE-2024-26872 affects several versions, including those prior to 5.10.214, 5.15.153, 6.1.83, 6.6.23, and other specified versions.
Yes, CVE-2024-26872 could potentially be exploited by an attacker with remote access to the affected systems.
Yes, patches are available in the form of updated kernel packages from vendors such as Red Hat and Debian.