In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
sockinitdata() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk object is freed, but the dangling pointer remains in the provided sock object, which may allow use-after-free.
Clear the sk pointer in the sock object on error.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56602.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56602.json"
[
{
"id": "CVE-2024-56602-2f82b7a5",
"digest": {
"line_hashes": [
"250751663072026986860421101365566913646",
"77451856701884608283399056642933748132",
"126840460113227135648063476922142487096",
"162298727995818665367981753790110402731",
"97029996644919869753970377261672592731",
"156116635674053235241368217718803546492",
"325004767489507669195653357555820671769",
"53444057533252372372231349771925588260",
"181067800778207221661549328610379735083",
"218539473012982878221876594957733548846",
"185938973399080495200735352538692406243",
"53806309044922951842611067922791088905",
"326617580906000906287434129391722334221",
"236744112334937464443029665393440736081",
"71137433170672816989113347210651187069"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4982fbf13042e3bb33e04eddfea8b1506b5ea65",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/ieee802154/socket.c"
}
},
{
"id": "CVE-2024-56602-6dd731b4",
"digest": {
"function_hash": "275515343006120619682226407649015557958",
"length": 1046.0
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4982fbf13042e3bb33e04eddfea8b1506b5ea65",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/ieee802154/socket.c",
"function": "ieee802154_create"
}
}
]