7.8
HIGH
CVE-2024-56606
"Linux Kernel af_packet Use-after-Free Vulnerability"
Description

In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.

INFO

Published Date :

Dec. 27, 2024, 3:15 p.m.

Last Modified :

Feb. 11, 2025, 4:15 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Public PoC/Exploit Available at Github

CVE-2024-56606 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-56606 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 2 days, 16 hours ago
4 stars 1 fork 1 watcher
Born at : April 16, 2025, 1:43 p.m. This repo has been linked 280 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-56606 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-56606 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 11, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-416
  • Initial Analysis by [email protected]

    Jan. 08, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE NIST CWE-416
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 5.4.287 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.231 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.174 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.120 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.66 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.5
    Changed Reference Type https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21 No Types Assigned https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21 Patch
    Changed Reference Type https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0 No Types Assigned https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0 Patch
    Changed Reference Type https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7 No Types Assigned https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7 Patch
    Changed Reference Type https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b No Types Assigned https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b Patch
    Changed Reference Type https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f No Types Assigned https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f Patch
    Changed Reference Type https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414 No Types Assigned https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414 Patch
    Changed Reference Type https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829 No Types Assigned https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829 Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 27, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.
    Added Reference https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21
    Added Reference https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0
    Added Reference https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7
    Added Reference https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b
    Added Reference https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f
    Added Reference https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414
    Added Reference https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-56606 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-56606 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 26, 2025 21:25