{"uuid": "778d9c53-1713-4969-9472-6e0f7dca6c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56601\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet: do not leave a dangling sk pointer in inet_create()\n\nsock_init_data() attaches the allocated sk object to the provided sock\nobject. If inet_create() fails later, the sk object is freed, but the\nsock object retains the dangling pointer, which may create use-after-free\nlater.\n\nClear the sk pointer in the sock object on error.\n\ud83d\udccf Published: 2024-12-27T14:51:07.358Z\n\ud83d\udccf Modified: 2025-05-16T07:25:15.700Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d\n2. https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c\n3. https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288\n4. https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b\n5. https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891\n6. https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef\n7. https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff", "creation_timestamp": "2025-05-16T07:33:50.000000Z"}