First published: Mon May 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix mlx5e_priv_init() cleanup flow The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-35959">CVE-2024-35959</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35959-6e06@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35959-6e06@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.87 | 6.1.87 |
redhat/kernel | <6.6.28 | 6.6.28 |
redhat/kernel | <6.8.7 | 6.8.7 |
redhat/kernel | <6.9 | 6.9 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35959 has a medium severity rating as it involves a cleanup flow issue in the Linux kernel.
To fix CVE-2024-35959, upgrade to the latest kernel versions such as 6.1.87, 6.6.28, 6.8.7, 6.9, or specific Debian Linux versions listed in the advisory.
CVE-2024-35959 affects multiple kernel versions, specifically those prior to 6.1.87, 6.6.28, 6.8.7, and 6.9.
Users and systems running the affected versions of the Linux kernel on Red Hat or Debian distributions may be impacted by CVE-2024-35959.
CVE-2024-35959 affects the net/mlx5e component within the Linux kernel.