In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with
__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().
Then, oreq should be passed to reqsk_put() instead of req; otherwise
use-after-free of nreq could happen when reqsk is migrated but the
retry attempt failed (e.g. due to timeout).
Let's pass oreq to reqsk_put().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-12-27 14:15
Updated : 2025-11-03 21:17
NVD link : CVE-2024-53206
Mitre link : CVE-2024-53206
CVE.ORG link : CVE-2024-53206
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
