SB2024123049 - Use-after-free in Linux kernel ipv4
Published: December 30, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2024-56633)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0d6cd1151e26fc7c2d5daa85e8984aaa685a1a12
- https://git.kernel.org/stable/c/206d56f41a1509cadd06e2178c26cb830e45057d
- https://git.kernel.org/stable/c/456f08d24afa51b5eb816c42e4ca1c44a247bd42
- https://git.kernel.org/stable/c/5c9e3bb43a354a2245caebbbbb4a5b8c034fdd56
- https://git.kernel.org/stable/c/905d82e6e77d16ec3e089c92b7b59a14899dfc1a
- https://git.kernel.org/stable/c/ca70b8baf2bd125b2a4d96e76db79375c07d7ff2
- https://git.kernel.org/stable/c/dbedc7e142df5ea238a46fdd7462c1c42cd36a10
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.231