In the Linux kernel, the following vulnerability has been resolved: x86/xen: Add some null pointer checking to smp.c The Linux kernel CVE team has assigned CVE-2024-26908 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024041747-CVE-2024-26908-4690@gregkh/T
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2275745]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4823 https://access.redhat.com/errata/RHSA-2024:4823
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4902 https://access.redhat.com/errata/RHSA-2024:4902
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5101 https://access.redhat.com/errata/RHSA-2024:5101
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:5928 https://access.redhat.com/errata/RHSA-2024:5928
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:6992 https://access.redhat.com/errata/RHSA-2024:6992
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:7002 https://access.redhat.com/errata/RHSA-2024:7002
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6993 https://access.redhat.com/errata/RHSA-2024:6993
This CVE has been rejected upstream:- https://lore.kernel.org/linux-cve-announce/2024043042-REJECTED-6155@gregkh/