In the Linux kernel, the following vulnerability has been resolved:
inet: read sk->sk_family once in inet_recv_error()
inet_recv_error() is called without holding the socket lock.
IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM
socket option and trigger a KCSAN warning.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2024-04-02 07:15
Updated : 2025-03-17 15:42
NVD link : CVE-2024-26679
Mitre link : CVE-2024-26679
CVE.ORG link : CVE-2024-26679
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-667
Improper Locking
