Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-56603
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Dec, 2024 | 14:51
Updated At-04 May, 2025 | 09:59
Rejected At-
▼CVE Numbering Authority (CNA)
net: af_can: do not leave a dangling sk pointer in can_create()

In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/can/af_can.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 884ae8bcee749be43a071d6ed2d89058dbd2425c (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ce39b5576785bb3e66591145aad03d66bc3e778d (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1fe625f12d090d69f3f084990c7e4c1ff94bfe5f (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5947c9ac08f0771ea8ed64186b0d52e9029cb6c0 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before db207d19adbac96058685f6257720906ad41d215 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8df832e6b945e1ba61467d7f1c9305e314ae92fe (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 811a7ca7320c062e15d0f5b171fe6ad8592d1434 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/can/af_can.c
Default Status
affected
Versions
Unaffected
  • From 5.4.287 through 5.4.* (semver)
  • From 5.10.231 through 5.10.* (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.66 through 6.6.* (semver)
  • From 6.12.5 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/884ae8bcee749be43a071d6ed2d89058dbd2425c
N/A
https://git.kernel.org/stable/c/ce39b5576785bb3e66591145aad03d66bc3e778d
N/A
https://git.kernel.org/stable/c/1fe625f12d090d69f3f084990c7e4c1ff94bfe5f
N/A
https://git.kernel.org/stable/c/5947c9ac08f0771ea8ed64186b0d52e9029cb6c0
N/A
https://git.kernel.org/stable/c/db207d19adbac96058685f6257720906ad41d215
N/A
https://git.kernel.org/stable/c/8df832e6b945e1ba61467d7f1c9305e314ae92fe
N/A
https://git.kernel.org/stable/c/811a7ca7320c062e15d0f5b171fe6ad8592d1434
N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found