First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-27010">CVE-2024-27010</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27010-5a68@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27010-5a68@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.2<6.8.8 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
Linux Kernel | =6.9-rc4 | |
redhat/kernel | <6.8.8 | 6.8.8 |
redhat/kernel | <6.9 | 6.9 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.128-1 | 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27010 has a moderate severity level due to the potential for device recursion deadlock in the Linux kernel.
To resolve CVE-2024-27010, update your Linux kernel to version 6.8.8, 6.9, or any of the patched versions provided by your distribution.
CVE-2024-27010 affects Linux kernel versions from 4.2 up to but not including 6.8.8 and specific release candidates of version 6.9.
Yes, CVE-2024-27010 is present in various unsupported versions of the Debian Linux kernel, and users should upgrade to patched versions.
Systems running vulnerable versions of the Linux kernel should be prioritized for updates to mitigate risks associated with CVE-2024-27010.