In the Linux kernel, the following vulnerability has been resolved: net/handshake: restore destructor on submit failure handshake_req_submit() replaces sk->sk_destruct but never restores it when submission fails before the request is hashed. handshake_sk_destruct() then returns early and the original destructor never runs, leaking the socket. Restore sk_destruct on the error path.
https://git.kernel.org/stable/c/cd8cf2be3717137554744233fda051ffc09d1d44
https://git.kernel.org/stable/c/b225325be7b247c7268e65eea6090db1fc786d1f
https://git.kernel.org/stable/c/7b82a1d6ae869533d8bdb0282a3a78faed8e63dd
https://git.kernel.org/stable/c/6af2a01d65f89e73c1cbb9267f8880d83a88cee4