![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26782 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix double-free on socket dismantle when MPTCP server accepts
an incoming connection, it clones its listener socket. However, the
pointer to 'inet_opt' for the new socket has the same value as the
original one: as a consequence, on program exit it's possible to
observe the following splat: BUG: KASAN: double-free in
inet_sock_destruct+0x54f/0x8b0 Free of addr ffff888485950880 by task
swapper/25/0 CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted
6.8.0-rc1+ #609 Hardware name: Supermicro
SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0 07/26/2013 Call Trace:
|
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26782 https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582 https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582 https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85 https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85 https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e |