In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
It seems that if userspace provides a correct IFA_TARGET_NETNSID value
but no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()
returns -EINVAL with an elevated "struct net" refcount.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 18:41
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/10bfd453da64a057bcfd1a49fb6b271c48653cdb - Patch | |
| References | () https://git.kernel.org/stable/c/1b0998fdd85776775d975d0024bca227597e836a - Patch | |
| References | () https://git.kernel.org/stable/c/33a1b6bfef6def2068c8703403759024ce17053e - Patch | |
| References | () https://git.kernel.org/stable/c/44112bc5c74e64f28f5a9127dc34066c7a09bd0f - Patch | |
| References | () https://git.kernel.org/stable/c/810fa7d5e5202fcfb22720304b755f1bdfd4c174 - Patch | |
| References | () https://git.kernel.org/stable/c/8a54834c03c30e549c33d5da0975f3e1454ec906 - Patch | |
| References | () https://git.kernel.org/stable/c/9d4ffb5b9d879a75e4f7460e8b10e756b4dfb132 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| CWE | CWE-401 |
21 Nov 2024, 09:04
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/10bfd453da64a057bcfd1a49fb6b271c48653cdb - | |
| References | () https://git.kernel.org/stable/c/1b0998fdd85776775d975d0024bca227597e836a - | |
| References | () https://git.kernel.org/stable/c/33a1b6bfef6def2068c8703403759024ce17053e - | |
| References | () https://git.kernel.org/stable/c/44112bc5c74e64f28f5a9127dc34066c7a09bd0f - | |
| References | () https://git.kernel.org/stable/c/810fa7d5e5202fcfb22720304b755f1bdfd4c174 - | |
| References | () https://git.kernel.org/stable/c/8a54834c03c30e549c33d5da0975f3e1454ec906 - | |
| References | () https://git.kernel.org/stable/c/9d4ffb5b9d879a75e4f7460e8b10e756b4dfb132 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
17 May 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 12:15
Updated : 2025-12-23 18:41
NVD link : CVE-2024-27417
Mitre link : CVE-2024-27417
CVE.ORG link : CVE-2024-27417
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
