CVE-2024-56600

Updated: 2025-01-14 17:54:03.261651

Description:

In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1738671431 2025-02-05 02:16:46
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Released CLSA-2025:1738670922 2025-02-05 02:16:47
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:56
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2025-01-14 13:41:43
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2025-01-14 13:41:42
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1738592614 2025-02-04 02:14:30
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:56
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
Total: 14