In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: fix racy skb_queue_empty() use The receive queues are protected
by their respective spin-lock, not the socket lock. This could lead to
skb_peek() unexpectedly returning NULL or a pointer to an already dequeued
socket buffer.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
git.kernel.org/linus/7d2a894d7f487dcb894df023e9d3014cf5b93fe5 (6.8-rc6)
git.kernel.org/stable/c/0a9f558c72c47472c38c05fcb72c70abb9104277
git.kernel.org/stable/c/7d2a894d7f487dcb894df023e9d3014cf5b93fe5
git.kernel.org/stable/c/8ef4fcc7014b9f93619851d6b78d6cc2789a4c88
git.kernel.org/stable/c/9d5523e065b568e79dfaa2ea1085a5bcf74baf78
launchpad.net/bugs/cve/CVE-2024-27402
nvd.nist.gov/vuln/detail/CVE-2024-27402
security-tracker.debian.org/tracker/CVE-2024-27402
www.cve.org/CVERecord?id=CVE-2024-27402