summaryrefslogtreecommitdiffstats
path: root/active/CVE-2024-26679
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-04-02 10:56:31 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2024-04-02 10:56:31 +0200
commit394790af91161b751b9411f7737a4207ba5c0b55 (patch)
treee24f0764bf786f47a569956869194e71add754ec /active/CVE-2024-26679
parent612fa53fe5f7ec56deab8572d3abc0d9f345e3c0 (diff)
Add new batch of CVEs assigned from Linux kernel CNA
Manual fixup for the sid version not correctly detecting 6.6.15-1 as the right now and instead using 6.7.7-1 one.
Diffstat (limited to 'active/CVE-2024-26679')
-rw-r--r--active/CVE-2024-2667916
1 files changed, 16 insertions, 0 deletions
diff --git a/active/CVE-2024-26679 b/active/CVE-2024-26679
new file mode 100644
index 00000000..e5909d3d
--- /dev/null
+++ b/active/CVE-2024-26679
@@ -0,0 +1,16 @@
+Description: inet: read sk->sk_family once in inet_recv_error()
+References:
+Notes:
+ carnil> Introduced in f4713a3dfad0 ("net-timestamp: make tcp_recvmsg call
+ carnil> ipv6_recv_error for AF_INET6 socks"). Vulnerable versions: 3.17.7 3.18-rc7.
+Bugs:
+upstream: released (6.8-rc4) [eef00a82c568944f113f2de738156ac591bbd5cd]
+6.7-upstream-stable: released (6.7.5) [307fa8a75ab7423fa5c73573ec3d192de5027830]
+6.6-upstream-stable: released (6.6.17) [4a5e31bdd3c1702b520506d9cf8c41085f75c7f2]
+6.1-upstream-stable: released (6.1.78) [54538752216bf89ee88d47ad07802063a498c299]
+5.10-upstream-stable: released (5.10.210) [88081ba415224cf413101def4343d660f56d082b]
+4.19-upstream-stable: released (4.19.307) [caa064c3c2394d03e289ebd6b0be5102eb8a5b40]
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy