CVE-2024-56603

In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 15:08

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: af_can: no deje un puntero sk colgando en can_create() En caso de error, can_create() libera el objeto sk asignado, pero sock_init_data() ya lo ha adjuntado al objeto sock proporcionado. Esto dejará un puntero sk colgando en el objeto sock y puede provocar un uso posterior a la liberación más adelante.
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/1fe625f12d090d69f3f084990c7e4c1ff94bfe5f - () https://git.kernel.org/stable/c/1fe625f12d090d69f3f084990c7e4c1ff94bfe5f - Patch
References () https://git.kernel.org/stable/c/5947c9ac08f0771ea8ed64186b0d52e9029cb6c0 - () https://git.kernel.org/stable/c/5947c9ac08f0771ea8ed64186b0d52e9029cb6c0 - Patch
References () https://git.kernel.org/stable/c/811a7ca7320c062e15d0f5b171fe6ad8592d1434 - () https://git.kernel.org/stable/c/811a7ca7320c062e15d0f5b171fe6ad8592d1434 - Patch
References () https://git.kernel.org/stable/c/884ae8bcee749be43a071d6ed2d89058dbd2425c - () https://git.kernel.org/stable/c/884ae8bcee749be43a071d6ed2d89058dbd2425c - Patch
References () https://git.kernel.org/stable/c/8df832e6b945e1ba61467d7f1c9305e314ae92fe - () https://git.kernel.org/stable/c/8df832e6b945e1ba61467d7f1c9305e314ae92fe - Patch
References () https://git.kernel.org/stable/c/ce39b5576785bb3e66591145aad03d66bc3e778d - () https://git.kernel.org/stable/c/ce39b5576785bb3e66591145aad03d66bc3e778d - Patch
References () https://git.kernel.org/stable/c/db207d19adbac96058685f6257720906ad41d215 - () https://git.kernel.org/stable/c/db207d19adbac96058685f6257720906ad41d215 - Patch

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-56603

Mitre link : CVE-2024-56603

CVE.ORG link : CVE-2024-56603


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free