First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix a race between socket set up and I/O thread creation In rxrpc_open_socket(), it sets up the socket and then sets up the I/O thread that will handle it. This is a problem, however, as there's a gap between the two phases in which a packet may come into rxrpc_encap_rcv() from the UDP packet but we oops when trying to wake the not-yet created I/O thread. As a quick fix, just make rxrpc_encap_rcv() discard the packet if there's no I/O thread yet. A better, but more intrusive fix would perhaps be to rearrange things such that the socket creation is done by the I/O thread.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.2<=6.6.55 | |
Linux Kernel | >=6.10<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49864 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-49864, upgrade to patched versions of the Linux kernel such as 5.10.223-1 or later.
CVE-2024-49864 affects Linux kernel versions from 6.2 up to 6.6.55, as well as certain 6.10 and 6.11 versions.
CVE-2024-49864 may potentially be exploited remotely due to the socket setup race condition.
The impacts of CVE-2024-49864 include the possibility of a denial of service due to improper handling of socket connections.