First published: Sun May 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-35910">CVE-2024-35910</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35910-5f95@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35910-5f95@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.312 | 4.19.312 |
redhat/kernel | <5.4.274 | 5.4.274 |
redhat/kernel | <5.10.215 | 5.10.215 |
redhat/kernel | <5.15.154 | 5.15.154 |
redhat/kernel | <6.1.85 | 6.1.85 |
redhat/kernel | <6.6.26 | 6.6.26 |
redhat/kernel | <6.8.5 | 6.8.5 |
redhat/kernel | <6.9 | 6.9 |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35910 has been classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-35910, ensure your Linux kernel is updated to at least version 4.19.312, 5.4.274, 5.10.215, 5.15.154, 6.1.85, 6.6.26, 6.8.5 or 6.9.
CVE-2024-35910 may cause improper timer termination for kernel sockets, potentially leading to instability in network operations.
CVE-2024-35910 affects various Linux kernel versions, specifically those below 4.19.312, 5.4.274, 5.10.215, 5.15.154, 6.1.85, 6.6.26, 6.8.5, and 6.9.
Yes, it is recommended to reboot the system after applying the patch for CVE-2024-35910 to ensure the new kernel version is fully operational.