In the Linux kernel, the following vulnerability has been resolved:
net: inet: do not leave a dangling sk pointer in inet_create()
sock_init_data() attaches the allocated sk object to the provided sock
object. If inet_create() fails later, the sk object is freed, but the
sock object retains the dangling pointer, which may create use-after-free
later.
Clear the sk pointer in the sock object on error.
References
Configurations
Configuration 1 (hide)
|
History
14 Jan 2025, 15:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891 - Patch | |
References | () https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c - Patch | |
References | () https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288 - Patch | |
References | () https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef - Patch | |
References | () https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff - Patch | |
References | () https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b - Patch | |
References | () https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d - Patch | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
27 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 15:15
Updated : 2025-02-11 16:15
NVD link : CVE-2024-56601
Mitre link : CVE-2024-56601
CVE.ORG link : CVE-2024-56601
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free