CVE-2024-56600

Updated: 2025-11-19 04:42:38.350175

Description:

In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1743193221 2025-02-05 02:16:47
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:56
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1739525834 2025-02-14 23:54:52
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1739525795 2025-02-14 23:54:53
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1738592614 2025-02-04 02:14:30
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:56
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-02-01 23:51:55
Total: 15