CVE-2024-56688

In the Linux kernel, the following vulnerability has been resolved: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport->sock has been set to NULL during reset transport, XPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the xs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request() to dereference the transport->sock that has been set to NULL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Jan 2025, 17:11

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sunrpc: borrar XPRT_SOCK_UPD_TIMEOUT al reiniciar el transporte Dado que transport->sock se ha establecido en NULL durante el reinicio del transporte, también es necesario borrar XPRT_SOCK_UPD_TIMEOUT. De lo contrario, xs_tcp_set_socket_timeouts() puede activarse en xs_tcp_send_request() para desreferenciar el transport->sock que se ha establecido en NULL.
First Time Linux linux Kernel
Linux
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964 - () https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964 - Patch
References () https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51 - () https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51 - Patch
References () https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40 - () https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40 - Patch
References () https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a - () https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a - Patch
References () https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e - () https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e - Patch
References () https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b - () https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b - Patch
References () https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a - () https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a - Patch
References () https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960 - () https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960 - Patch

28 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-28 10:15

Updated : 2025-01-08 17:11


NVD link : CVE-2024-56688

Mitre link : CVE-2024-56688

CVE.ORG link : CVE-2024-56688


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference