First published: Thu May 30 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-36899">CVE-2024-36899</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36899-bfb1@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36899-bfb1@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.31 | 6.6.31 |
redhat/kernel | <6.8.10 | 6.8.10 |
redhat/kernel | <6.9 | 6.9 |
Linux Kernel | >=5.7<6.6.31 | |
Linux Kernel | >=6.7<6.8.10 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
Linux Kernel | =6.9-rc4 | |
Linux Kernel | =6.9-rc5 | |
Linux Kernel | =6.9-rc6 | |
Linux Kernel | =6.9-rc7 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1 | 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36899 has been rated as a high severity vulnerability affecting the Linux kernel.
To fix CVE-2024-36899, update the affected Linux kernel versions to the latest recommended secure versions.
CVE-2024-36899 affects various versions of the Linux kernel, particularly versions prior to 6.6.31 and select others.
Yes, if your system is running an affected version of the Linux kernel, it is at risk of exploitation due to CVE-2024-36899.
CVE-2024-36899 impacts the gpiolib subsystem, specifically an issue caused by a use-after-free condition.