2024-12-27 17:03:43 +00:00
{
"id" : "CVE-2024-56600" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-12-27T15:15:19.410" ,
2025-01-14 17:03:53 +00:00
"lastModified" : "2025-01-14T15:17:32.717" ,
"vulnStatus" : "Analyzed" ,
2024-12-27 17:03:43 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet6: do not leave a dangling sk pointer in inet6_create()\n\nsock_init_data() attaches the allocated sk pointer to the provided sock\nobject. If inet6_create() fails later, the sk object is released, but the\nsock object retains the dangling sk pointer, which may cause use-after-free\nlater.\n\nClear the sock sk pointer on error."
2025-01-05 03:03:46 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: inet6: no deje un puntero sk colgando en inet6_create() sock_init_data() adjunta el puntero sk asignado al objeto sock proporcionado. Si inet6_create() falla m\u00e1s tarde, se libera el objeto sk, pero el objeto sock conserva el puntero sk colgando, lo que puede provocar un use-after-free m\u00e1s adelante. Borre el puntero sk sock en caso de error."
2024-12-27 17:03:43 +00:00
}
] ,
2025-01-14 17:03:53 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "5.4.287" ,
"matchCriteriaId" : "DC7D5C80-B677-4131-A399-3366D7F3961C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
"versionEndExcluding" : "5.10.231" ,
"matchCriteriaId" : "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.11" ,
"versionEndExcluding" : "5.15.174" ,
"matchCriteriaId" : "419FD073-1517-4FD5-8158-F94BC68A1E89"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.16" ,
"versionEndExcluding" : "6.1.120" ,
"matchCriteriaId" : "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.2" ,
"versionEndExcluding" : "6.6.66" ,
"matchCriteriaId" : "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.7" ,
"versionEndExcluding" : "6.12.5" ,
"matchCriteriaId" : "9501D045-7A94-42CA-8B03-821BE94A65B7"
}
]
}
]
}
] ,
2024-12-27 17:03:43 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/276a473c956fb55a6f3affa9ff232e10fffa7b43" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/35360255ca30776dee34d9fa764cffa24d0a5f65" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/706b07b7b37f886423846cb38919132090bc40da" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/79e16a0d339532ea832d85798eb036fc4f9e0cea" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/9df99c395d0f55fb444ef39f4d6f194ca437d884" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/f2709d1271cfdf55c670ab5c5982139ab627ddc7" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/f44fceb71d72d29fb00e0ac84cdf9c081b03cd06" ,
2025-01-14 17:03:53 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-27 17:03:43 +00:00
}
]
}