๐Ÿ” CVE Alert

CVE-2024-50260

MEDIUM 4.7

sock_map: fix a NULL pointer dereference in sock_map_link_update_prog()

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() The following race condition could trigger a NULL pointer dereference: sock_map_link_detach(): sock_map_link_update_prog(): mutex_lock(&sockmap_mutex); ... sockmap_link->map = NULL; mutex_unlock(&sockmap_mutex); mutex_lock(&sockmap_mutex); ... sock_map_prog_link_lookup(sockmap_link->map); mutex_unlock(&sockmap_mutex); <continue> Fix it by adding a NULL pointer check. In this specific case, it makes no sense to update a link which is being released.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
699c23f02c65cbfc3e638f14ce0d70c23a2e1f02 < 9afe35fdda16e09d5bd3c49a68ba8c680dd678bd 699c23f02c65cbfc3e638f14ce0d70c23a2e1f02 < 740be3b9a6d73336f8c7d540842d0831dc7a808b
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9afe35fdda16e09d5bd3c49a68ba8c680dd678bd git.kernel.org: https://git.kernel.org/stable/c/740be3b9a6d73336f8c7d540842d0831dc7a808b