In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: fix racy skb_queue_empty() use
The receive queues are protected by their respective spin-lock, not
the socket lock. This could lead to skb_peek() unexpectedly
returning NULL or a pointer to an already dequeued socket buffer.
References
Configurations
No configuration.
History
02 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 09:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0a9f558c72c47472c38c05fcb72c70abb9104277 - | |
References | () https://git.kernel.org/stable/c/7d2a894d7f487dcb894df023e9d3014cf5b93fe5 - | |
References | () https://git.kernel.org/stable/c/8ef4fcc7014b9f93619851d6b78d6cc2789a4c88 - | |
References | () https://git.kernel.org/stable/c/9d5523e065b568e79dfaa2ea1085a5bcf74baf78 - |
07 Nov 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.8 |
Summary |
|
17 May 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 12:15
Updated : 2025-05-02 07:15
NVD link : CVE-2024-27402
Mitre link : CVE-2024-27402
CVE.ORG link : CVE-2024-27402
JSON object : View
Products Affected
No product.
CWE
No CWE.