First published: Sat Nov 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() The following race condition could trigger a NULL pointer dereference: sock_map_link_detach(): sock_map_link_update_prog(): mutex_lock(&sockmap_mutex); ... sockmap_link->map = NULL; mutex_unlock(&sockmap_mutex); mutex_lock(&sockmap_mutex); ... sock_map_prog_link_lookup(sockmap_link->map); mutex_unlock(&sockmap_mutex); <continue> Fix it by adding a NULL pointer check. In this specific case, it makes no sense to update a link which is being released.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10<6.11.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50260 is classified as a vulnerability that can lead to a NULL pointer dereference in the Linux kernel.
To remediate CVE-2024-50260, update to the patched version of the Linux kernel that addresses the vulnerability.
CVE-2024-50260 affects Linux kernel versions from 6.10 to 6.11.7 and specific release candidates from 6.12.
CVE-2024-50260 involves the sock_map component and its functions such as sock_map_link_update_prog().
As of now, there are no public exploits for CVE-2024-50260, but it is advisable to apply patches promptly.