Metrics
Affected Vendors & Products
Tue, 14 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 01 Jan 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 30 Dec 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 27 Dec 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler(). Then, oreq should be passed to reqsk_put() instead of req; otherwise use-after-free of nreq could happen when reqsk is migrated but the retry attempt failed (e.g. due to timeout). Let's pass oreq to reqsk_put(). | |
Title | tcp: Fix use-after-free of nreq in reqsk_timer_handler(). | |
References |
|
|
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-27T13:49:52.131Z
Updated: 2024-12-27T13:49:52.131Z
Reserved: 2024-11-19T17:17:25.019Z
Link: CVE-2024-53206
No data.
Status : Analyzed
Published: 2024-12-27T14:15:28.453
Modified: 2025-01-14T17:20:51.140
Link: CVE-2024-53206