CVE-2024-56600

Source
https://cve.org/CVERecord?id=CVE-2024-56600
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56600.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56600
Downstream
Related
Published
2024-12-27T14:51:06.610Z
Modified
2026-03-20T12:39:53.982758Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
net: inet6: do not leave a dangling sk pointer in inet6_create()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: inet6: do not leave a dangling sk pointer in inet6_create()

sockinitdata() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later.

Clear the sock sk pointer on error.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56600.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
f2709d1271cfdf55c670ab5c5982139ab627ddc7
Fixed
35360255ca30776dee34d9fa764cffa24d0a5f65
Fixed
276a473c956fb55a6f3affa9ff232e10fffa7b43
Fixed
79e16a0d339532ea832d85798eb036fc4f9e0cea
Fixed
706b07b7b37f886423846cb38919132090bc40da
Fixed
f44fceb71d72d29fb00e0ac84cdf9c081b03cd06
Fixed
9df99c395d0f55fb444ef39f4d6f194ca437d884

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56600.json"