First published: Fri Jun 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: virtio: delete vq in vp_find_vqs_msix() when request_irq() fails The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-37353">CVE-2024-37353</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37353-71d4@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37353-71d4@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.316 | 4.19.316 |
redhat/kernel | <5.4.278 | 5.4.278 |
redhat/kernel | <5.10.219 | 5.10.219 |
redhat/kernel | <5.15.161 | 5.15.161 |
redhat/kernel | <6.1.93 | 6.1.93 |
redhat/kernel | <6.6.33 | 6.6.33 |
redhat/kernel | <6.9.4 | 6.9.4 |
redhat/kernel | <6.10 | 6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-37353 is categorized as moderate due to the possible implications for system stability.
To fix CVE-2024-37353, update your Linux kernel to one of the remedied versions specified by your distribution.
The affected versions include kernel versions prior to 4.19.316, 5.4.278, 5.10.219, 5.15.161, 6.1.93, 6.6.33, 6.9.4, and 6.10.
CVE-2024-37353 does not present a remote exploitation vector; it primarily affects local system interactions.
CVE-2024-37353 primarily impacts systems running the affected versions of the Linux kernel on various supported platforms.