CVE-2024-56604

Source
https://cve.org/CVERecord?id=CVE-2024-56604
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56604.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56604
Downstream
Related
Published
2024-12-27T14:51:09.618Z
Modified
2026-03-20T12:39:54.199093Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcommsockalloc()

btsockalloc() attaches allocated sk object to the provided sock object. If rfcommdlcalloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free.

Fix this by swapping calls to btsockalloc() and rfcommdlcalloc().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56604.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
ac3eaac4cf142a15fe67be747a682b1416efeb6e
Fixed
6021ccc2471b7b95e29b7cfc7938e042bf56e281
Fixed
32df687e129ef0f9afcbcc914f7c32deb28fd481
Fixed
3945c799f12b8d1f49a3b48369ca494d981ac465

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56604.json"