{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-26606","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.130Z","datePublished":"2024-02-26T14:39:15.861Z","dateUpdated":"2025-11-04T18:29:53.507Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:52:12.161Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: signal epoll threads of self-work\n\nIn (e)poll mode, threads often depend on I/O events to determine when\ndata is ready for consumption. Within binder, a thread may initiate a\ncommand via BINDER_WRITE_READ without a read buffer and then make use\nof epoll_wait() or similar to consume any responses afterwards.\n\nIt is then crucial that epoll threads are signaled via wakeup when they\nqueue their own work. Otherwise, they risk waiting indefinitely for an\nevent leaving their work unhandled. What is worse, subsequent commands\nwon't trigger a wakeup either as the thread has pending work."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/android/binder.c"],"versions":[{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"dd64bb8329ce0ea27bc557e4160c2688835402ac","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"42beab162dcee1e691ee4934292d51581c29df61","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"a423042052ec2bdbf1e552e621e6a768922363cc","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"82722b453dc2f967b172603e389ee7dc1b3137cc","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"90e09c016d72b91e76de25f71c7b93d94cc3c769","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"a7ae586f6f6024f490b8546c8c84670f96bb9b68","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"93b372c39c40cbf179e56621e6bc48240943af69","status":"affected","versionType":"git"},{"version":"457b9a6f09f011ebcb9b52cc203a6331a6fc2de7","lessThan":"97830f3c3088638ff90b20dfba2eb4d487bf14d7","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/android/binder.c"],"versions":[{"version":"2.6.29","status":"affected"},{"version":"0","lessThan":"2.6.29","status":"unaffected","versionType":"semver"},{"version":"4.19.307","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.269","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.210","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.149","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.79","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.18","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.6","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"4.19.307"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"5.4.269"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"5.10.210"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"5.15.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.1.79"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.6.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.7.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac"},{"url":"https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61"},{"url":"https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc"},{"url":"https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc"},{"url":"https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769"},{"url":"https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68"},{"url":"https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69"},{"url":"https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7"}],"title":"binder: signal epoll threads of self-work","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-28T17:03:56.068498Z","id":"CVE-2024-26606","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-28T17:03:58.774Z"}},{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T18:29:53.507Z"}}]},"dataVersion":"5.2"}