CVE-2024-50186Use After Free in Linux

CWE-416Use After Free49 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV5.5
EPSS
0.0%
top 97.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 8
Latest updateJun 5

Description

In the Linux kernel, the following vulnerability has been resolved: net: explicitly clear the sk pointer, when pf->create fails We have recently noticed the exact same KASAN splat as in commit 6cd4a78d962b ("net: do not leave a dangling sk pointer, when socket creation fails"). The problem is that commit did not fully address the problem, as some pf->create implementations do not use sk_common_release in their error paths. For example, we can use the same reproducer as in the above commit, bu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

NVDlinux/linux_kernel5.15.1625.15.168+5
Debianlinux/linux_kernel< 6.1.115-1+2
Ubuntulinux/linux_kernel< 5.15.0-127.137+2
CVEListV5linux/linux78e4aa528a7b1204219d808310524344f627d069daf462ff3cde6ecf22b98d9ae770232c10d28de2+6
debiandebian/linux< linux 6.1.115-1 (bookworm)

Patches

🔴Vulnerability Details

24
OSV
gst-plugins-bad1.0 vulnerabilities2025-06-05
OSV
linux-raspi vulnerabilities2025-05-26
OSV
linux-raspi-realtime vulnerabilities2025-05-20
OSV
linux-azure-nvidia vulnerabilities2025-04-28
OSV
linux-aws-6.8 vulnerabilities2025-04-23

📋Vendor Advisories

24
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-05-26
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-05-20
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-04-28
Ubuntu
Linux kernel vulnerabilities2025-04-23
Ubuntu
Linux kernel (Azure) vulnerabilities2025-04-01
CVE-2024-50186 — Use After Free in Linux | cvebase