{"vulnerability": "CVE-2024-56601", "sightings": [{"uuid": "775848a7-1804-4aad-86d6-1d96e11c3f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvm3ceo22", "content": "", "creation_timestamp": "2024-12-27T15:17:55.188181Z"}, {"uuid": "ef1bd920-0047-404c-847c-65fa32588506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lsjz622x5s2r", "content": "", "creation_timestamp": "2025-06-26T20:55:30.104987Z"}, {"uuid": "2e8da905-78c4-4fde-b140-4175e670e28d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lsmfkxk22k2c", "content": "", "creation_timestamp": "2025-06-27T19:42:47.528208Z"}, {"uuid": "4f57dedf-2dac-4f6a-a275-0ddb21d71cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lska34c7x22r", "content": "", "creation_timestamp": "2025-06-26T22:59:07.826714Z"}, {"uuid": "8c3f6015-62b6-41b3-ab91-fcbbd295cc24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "778d9c53-1713-4969-9472-6e0f7dca6c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56601", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56601\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet: do not leave a dangling sk pointer in inet_create()\n\nsock_init_data() attaches the allocated sk object to the provided sock\nobject. If inet_create() fails later, the sk object is freed, but the\nsock object retains the dangling pointer, which may create use-after-free\nlater.\n\nClear the sk pointer in the sock object on error.\n\ud83d\udccf Published: 2024-12-27T14:51:07.358Z\n\ud83d\udccf Modified: 2025-05-16T07:25:15.700Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d\n2. https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c\n3. https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288\n4. https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b\n5. https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891\n6. https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef\n7. https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff", "creation_timestamp": "2025-05-16T07:33:50.000000Z"}]}