In the Linux kernel, the following vulnerability has been resolved:
net: inet6: do not leave a dangling sk pointer in inet6_create()
sockinitdata() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later.
Clear the sock sk pointer on error.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56600.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56600.json"
[
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35360255ca30776dee34d9fa764cffa24d0a5f65",
"deprecated": false,
"target": {
"file": "net/ipv6/af_inet6.c"
},
"digest": {
"line_hashes": [
"1645759656247343819965228770245094554",
"15032172165569420389138842003096578601",
"94196277495474780502580467586212688898",
"16066910106425491170984666037832690155",
"97029996644919869753970377261672592731",
"156116635674053235241368217718803546492",
"30598990978814734894761210860639258162",
"134799668830152082847293825483294648712",
"226330329984723294893071652960967233658",
"279498248213085552659192648000042459318",
"16066910106425491170984666037832690155",
"97029996644919869753970377261672592731",
"10604716443879236869646081524051810785",
"332607131942570719375672374514384826173",
"52933841757243123156999793500485122340",
"283437343186612655921934159074136378610",
"96245447294742051462886248290461159717",
"16066910106425491170984666037832690155",
"97029996644919869753970377261672592731",
"109388128052665260361439665827095668367",
"319006989805338926477200904854121024136",
"22710687377390316962075731360513372629",
"44266046448060408779031208463827506188",
"77662536059547782183222510558689294664",
"238926392122160158886781918090294393900",
"144780614303565632957385098438332594506",
"80306737589398469558294084307259207100"
],
"threshold": 0.9
},
"id": "CVE-2024-56600-b72d0fc1"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/af_inet6.c",
"function": "inet6_create"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35360255ca30776dee34d9fa764cffa24d0a5f65",
"deprecated": false,
"digest": {
"function_hash": "57939950539248691982061450091111309834",
"length": 2793.0
},
"id": "CVE-2024-56600-cd5676e1",
"signature_type": "Function"
}
]