{"id":"CVE-2024-56688","summary":"sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport\n\nSince transport-\u003esock has been set to NULL during reset transport,\nXPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the\nxs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request()\nto dereference the transport-\u003esock that has been set to NULL.","modified":"2026-04-02T12:25:08.097328Z","published":"2024-12-28T09:46:14.905Z","related":["SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:0834-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56688.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51"},{"type":"WEB","url":"https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56688.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56688"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7196dbb02ea05835b9ee56910ee82cb55422c7f1"},{"fixed":"cc91d59d34ff6a6fee1c0b48612081a451e05e9a"},{"fixed":"86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e"},{"fixed":"fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960"},{"fixed":"87a95ee34a48dfad198a2002e4966e1d63d53f2b"},{"fixed":"3811172e8c98ceebd12fe526ca6cb37a1263c964"},{"fixed":"638a8fa5a7e641f9401346c57e236f02379a0c40"},{"fixed":"66d11ca91bf5100ae2e6b5efad97e58d8448843a"},{"fixed":"4db9ad82a6c823094da27de4825af693a3475d51"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56688.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}