In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter The Linux kernel CVE team has assigned CVE-2024-26744 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024040301-CVE-2024-26744-d344@gregkh/T
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2273261]
Isn't this just a root-can-shoot-himself-in-the-foot bug? Why is it a CVE?
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3618 https://access.redhat.com/errata/RHSA-2024:3618
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3627 https://access.redhat.com/errata/RHSA-2024:3627