In the Linux kernel, the following vulnerability has been resolved:
inet: read sk->sk_family once in inet_recv_error()
inet_recv_error() is called without holding the socket lock.
IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM
socket option and trigger a KCSAN warning.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Mar 2025, 15:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/307fa8a75ab7423fa5c73573ec3d192de5027830 - Patch | |
References | () https://git.kernel.org/stable/c/3266e638ba5cc1165f5e6989eb8c0720f1cc4b41 - Patch | |
References | () https://git.kernel.org/stable/c/4a5e31bdd3c1702b520506d9cf8c41085f75c7f2 - Patch | |
References | () https://git.kernel.org/stable/c/54538752216bf89ee88d47ad07802063a498c299 - Patch | |
References | () https://git.kernel.org/stable/c/5993f121fbc01dc2d734f0ff2628009b258fb1dd - Patch | |
References | () https://git.kernel.org/stable/c/88081ba415224cf413101def4343d660f56d082b - Patch | |
References | () https://git.kernel.org/stable/c/caa064c3c2394d03e289ebd6b0be5102eb8a5b40 - Patch | |
References | () https://git.kernel.org/stable/c/eef00a82c568944f113f2de738156ac591bbd5cd - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 | |
First Time |
Debian debian Linux
Linux linux Kernel Debian Linux |
Information
Published : 2024-04-02 07:15
Updated : 2025-03-17 15:42
NVD link : CVE-2024-26679
Mitre link : CVE-2024-26679
CVE.ORG link : CVE-2024-26679
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-667
Improper Locking