- Description
- In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Modified
- Products
- linux_kernel
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
🚨 CVE-2024-56601 (CVSS 8.5) in Linux Kernel lets attackers escalate privileges via dangling pointers. Patch NOW: zypper patch #SUSE-SU-2025:02171-1 Read more: 👉 https://t.co/vwCLMW1UYA https://t.co/jM28RKnzKF
@Cezar_H_Linux
1 Jul 2025
42 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
⚠️ CVE-2024-56601 (CVSS 8.5) in Linux Kernel ⚠️ New SUSE patch fixes kernel memory leaks, Bluetooth UAF, and dm-cache OOB access. Patch ASAP if you’re on: ✅ SLE 15 SP3 ✅ OpenSUSE Leap 15.3 ✅ SLE Micro 5.x Read more: 👉https://t.co/4ZjZaReO5R #Linux #Infos
@Cezar_H_Linux
27 Jun 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #Linux admins: CVE-2024-56601 (CVSS 8.5) and 8 other flaws patched in SUSE’s latest kernel update. Exploits target Bluetooth, networking, and dm-cache. Patch via zypper or YaST ASAP! Read more: 👉 https://t.co/lrY7OxBy2h #CyberSecurity #SUSE https://t.co/MlqyefCZB7
@Cezar_H_Linux
26 Jun 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-56601 (8.5 CVSS) lets attackers escalate privileges via Linux kernel. SUSE’s Live Patch 21 fixes it + a Bluetooth flaw (CVE-2024-56605). Patch now: Read more: 👉 https://t.co/JHTwjlGHmk #InfoSec #DevOps https://t.co/qabGudzAMB
@Cezar_H_Linux
26 Jun 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-56601 & CVE-2024-56605 patched in #Linux Kernel 5.14.21 (SUSE SLE 15 SP5). CVSS 8.5—patch via zypper or YaST. Details: 👉 https://t.co/eSXfj1XDdS #InfoSec #DevOps https://t.co/XJmEKvm0hP
@Cezar_H_Linux
26 Jun 2025
52 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-56601 (CVSS 8.5) lets attackers corrupt kernel memory via inet_create(). #SUSE’s new patch drops today for SLE 15 SP5. Patch guide: Read more:👉 https://t.co/q0heF7xl31 #InfoSec #DevOps https://t.co/akoTRDEJAp
@Cezar_H_Linux
26 Jun 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-56601 In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the all… https://t.co/KEZukoE2JJ
@CVEnew
27 Dec 2024
309 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7D5C80-B677-4131-A399-3366D7F3961C",
"versionEndExcluding": "5.4.287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935",
"versionEndExcluding": "5.10.231",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89",
"versionEndExcluding": "5.15.174",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265",
"versionEndExcluding": "6.1.120",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9",
"versionEndExcluding": "6.6.66",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7",
"versionEndExcluding": "6.12.5",
"versionStartIncluding": "6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]