Software which sets SO_REUSEPORT_LB on a socket and then connects it to a host will not directly observe any problems. However, due to its membership in a load-balancing group, that socket will receive packets originating from any host. This breaks the contract of the connect(2) and implied connect via sendto(2), and may leave the application vulnerable to spoofing attacks.
The kernel failed to check the connection state of sockets when adding them to load-balancing groups. Furthermore, when looking up the destination socket for an incoming packet, the kernel will match a socket belonging to a load-balancing group even if it is connected, in violation of the contract that connected socketsĀ are only supposed to receive packets originating from the connected host.
References
Configurations
No configuration.
History
22 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
22 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-22 18:15
Updated : 2025-10-22 21:12
NVD link : CVE-2025-24934
Mitre link : CVE-2025-24934
CVE.ORG link : CVE-2025-24934
JSON object : View
Products Affected
No product.
CWE
CWE-488
Exposure of Data Element to Wrong Session
