CVE-2024-26831

Source
https://cve.org/CVERecord?id=CVE-2024-26831
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26831.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26831
Downstream
Related
Published
2024-04-17T09:43:54.270Z
Modified
2026-03-14T12:30:00.684559Z
Summary
net/handshake: Fix handshake_req_destroy_test1
Details

In the Linux kernel, the following vulnerability has been resolved:

net/handshake: Fix handshakereqdestroy_test1

Recently, handshakereqdestroy_test1 started failing:

Expected handshakereqdestroytest == req, but handshakereqdestroytest == 0000000000000000 req == 0000000060f99b40 not ok 11 req_destroy works

This is because "sockrelease(sock)" was replaced with "fput(filp)" to address a memory leak. Note that sockrelease() is synchronous but fput() usually delays the final close and clean-up.

The delay is not consequential in the other cases that were changed but handshakereqdestroytest1 is testing that handshakereqcancel() followed by closing the file actually does call the ->hpdestroy method. Thus the PTR_EQ test at the end has to be sure that the final close is complete before it checks the pointer.

We cannot use a completion here because if ->hp_destroy is never called (ie, there is an API bug) then the test will hang.

Reported by: Guenter Roeck linux@roeck-us.net

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26831.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4a0f07d71b0483cc08c03cefa7c85749e187c214
Fixed
d74226e03df1bf19848f18344401f254345af912
Fixed
7f97805b8df6e33850e225e6bd3ebd9e246920af
Fixed
4e1d71cabb19ec2586827adfc60d68689c68c194
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1751e44980466e3ebc246d22d3ebd422197704b6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26831.json"