Vulnerabilities > CVE-2024-56603 - Use After Free vulnerability in Linux Kernel
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided sock object. This will leave a dangling sk pointer in the sock object and may cause use-after-free later.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://git.kernel.org/stable/c/1fe625f12d090d69f3f084990c7e4c1ff94bfe5f
- https://git.kernel.org/stable/c/5947c9ac08f0771ea8ed64186b0d52e9029cb6c0
- https://git.kernel.org/stable/c/811a7ca7320c062e15d0f5b171fe6ad8592d1434
- https://git.kernel.org/stable/c/884ae8bcee749be43a071d6ed2d89058dbd2425c
- https://git.kernel.org/stable/c/8df832e6b945e1ba61467d7f1c9305e314ae92fe
- https://git.kernel.org/stable/c/ce39b5576785bb3e66591145aad03d66bc3e778d
- https://git.kernel.org/stable/c/db207d19adbac96058685f6257720906ad41d215