CVE-2024-26950: In the Linux kernel, the following vulnerability has been resolved: wireguard: netlink: access device through ctx inste
mediumvulnerability
security
Summary
A vulnerability in the Linux kernel's WireGuard (a VPN protocol implementation) netlink interface was fixed by changing how the code accesses device information. Instead of getting the device through a peer object (which could be NULL or invalid), the code now retrieves it from a context object, which is safer and faster.
Solution / Mitigation
Access the device through ctx->wg (the context object) instead of peer->device, and compare ctx->wg->peer_allowedips.seq with ctx->allowedips_seq to keep both references based in the same context object.
Vulnerability Details
CVSS Score
5.5(medium)
EPSS (30-day exploit probability)
EPSS: 0.0%
Classification
Attack SophisticationModerate
Taxonomy References
CWE (Weakness Type)
Original source: https://nvd.nist.gov/vuln/detail/CVE-2024-26950
First tracked: February 15, 2026 at 08:35 PM
Classified by LLM (prompt v3) · confidence: 95%