25 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-50260",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-09T11:15:11.550",
"lastModified": "2024-11-09T11:15:11.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsock_map: fix a NULL pointer dereference in sock_map_link_update_prog()\n\nThe following race condition could trigger a NULL pointer dereference:\n\nsock_map_link_detach():\t\tsock_map_link_update_prog():\n mutex_lock(&sockmap_mutex);\n ...\n sockmap_link->map = NULL;\n mutex_unlock(&sockmap_mutex);\n \t\t\t\t mutex_lock(&sockmap_mutex);\n\t\t\t\t ...\n\t\t\t\t sock_map_prog_link_lookup(sockmap_link->map);\n\t\t\t\t mutex_unlock(&sockmap_mutex);\n <continue>\n\nFix it by adding a NULL pointer check. In this specific case, it makes\nno sense to update a link which is being released."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/740be3b9a6d73336f8c7d540842d0831dc7a808b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9afe35fdda16e09d5bd3c49a68ba8c680dd678bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}