CVE-2024-56601

In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 15:17

Type Values Removed Values Added
CWE CWE-416
References () https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891 - () https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891 - Patch
References () https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c - () https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c - Patch
References () https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288 - () https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288 - Patch
References () https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef - () https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef - Patch
References () https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff - () https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff - Patch
References () https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b - () https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b - Patch
References () https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d - () https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: inet: no deje un puntero sk colgando en inet_create() sock_init_data() adjunta el objeto sk asignado al objeto sock proporcionado. Si inet_create() falla más tarde, el objeto sk se libera, pero el objeto sock conserva el puntero colgando, lo que puede crear un use-after-free más tarde. Borre el puntero sk en el objeto sock en caso de error.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-56601

Mitre link : CVE-2024-56601

CVE.ORG link : CVE-2024-56601


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free