Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-53206
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Dec, 2024 | 13:49
Updated At-03 Nov, 2025 | 20:47
Rejected At-
▼CVE Numbering Authority (CNA)
tcp: Fix use-after-free of nreq in reqsk_timer_handler().

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler(). Then, oreq should be passed to reqsk_put() instead of req; otherwise use-after-free of nreq could happen when reqsk is migrated but the retry attempt failed (e.g. due to timeout). Let's pass oreq to reqsk_put().

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv4/inet_connection_sock.c
Default Status
unaffected
Versions
Affected
  • From 8459d61fbf24967839a70235165673148c7c7f17 before 2dcc86fefe09ac853158afd96b60d544af115dc5 (git)
  • From 5071beb59ee416e8ab456ac8647a4dabcda823b1 before 9a3c1ad93e6fba67b3a637cfa95a57a6685e4908 (git)
  • From 997ae8da14f1639ce6fb66a063dab54031cd61b3 before 65ed89cad1f57034c256b016e89e8c0a4ec7c65b (git)
  • From 51e34db64f4e43c7b055ccf881b7f3e0c31bb26d before d0eb14cb8c08b00c36a3d5dc57a6f428b301f721 (git)
  • From e8c526f2bdf1845bedaf6a478816a3d06fa78b8f before 6d845028609a4af0ad66f499ee0bd5789122b067 (git)
  • From e8c526f2bdf1845bedaf6a478816a3d06fa78b8f before c31e72d021db2714df03df6c42855a1db592716c (git)
  • 106e457953315e476b3642ef24be25ed862aaba3 (git)
  • c964bf65f80a14288d767023a1b300b30f5b9cd0 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/ipv4/inet_connection_sock.c
Default Status
affected
Versions
Affected
  • 6.12
Unaffected
  • From 0 before 6.12 (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.64 through 6.6.* (semver)
  • From 6.11.11 through 6.11.* (semver)
  • From 6.12.2 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2dcc86fefe09ac853158afd96b60d544af115dc5
N/A
https://git.kernel.org/stable/c/9a3c1ad93e6fba67b3a637cfa95a57a6685e4908
N/A
https://git.kernel.org/stable/c/65ed89cad1f57034c256b016e89e8c0a4ec7c65b
N/A
https://git.kernel.org/stable/c/d0eb14cb8c08b00c36a3d5dc57a6f428b301f721
N/A
https://git.kernel.org/stable/c/6d845028609a4af0ad66f499ee0bd5789122b067
N/A
https://git.kernel.org/stable/c/c31e72d021db2714df03df6c42855a1db592716c
N/A
Hyperlink: https://git.kernel.org/stable/c/2dcc86fefe09ac853158afd96b60d544af115dc5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9a3c1ad93e6fba67b3a637cfa95a57a6685e4908
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/65ed89cad1f57034c256b016e89e8c0a4ec7c65b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d0eb14cb8c08b00c36a3d5dc57a6f428b301f721
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6d845028609a4af0ad66f499ee0bd5789122b067
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c31e72d021db2714df03df6c42855a1db592716c
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Details not found