Skip to main content

CVE-2024-56602: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56602cvecve-2024-56602
Published: Fri Dec 27 2024 (12/27/2024, 14:51:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fails later, the allocated sk object is freed, but the dangling pointer remains in the provided sock object, which may allow use-after-free. Clear the sk pointer in the sock object on error.

AI-Powered Analysis

AILast updated: 07/02/2025, 23:14:37 UTC

Technical Analysis

CVE-2024-56602 is a high-severity use-after-free vulnerability in the Linux kernel's IEEE 802.15.4 networking subsystem. Specifically, the flaw exists in the ieee802154_create() function, which is responsible for creating socket objects (sk) associated with IEEE 802.15.4 protocol sockets. During socket initialization, sock_init_data() attaches an allocated sk object to the provided sock object. However, if ieee802154_create() fails after this attachment, the allocated sk object is freed but the pointer within the sock object is not cleared, resulting in a dangling pointer. This dangling pointer can lead to a use-after-free condition, where subsequent kernel operations may access freed memory. Such use-after-free vulnerabilities can be exploited to cause memory corruption, potentially allowing an attacker to escalate privileges, execute arbitrary code in kernel context, or cause denial of service by crashing the kernel. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and likely other versions prior to the patch. The CVSS v3.1 base score is 7.8 (high), with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild. The vulnerability is categorized under CWE-416 (Use After Free). The fix involves clearing the sk pointer in the sock object upon error to prevent dangling references. This vulnerability is particularly relevant for systems using the IEEE 802.15.4 protocol stack, which is commonly used in low-rate wireless personal area networks (LR-WPANs) such as Zigbee and Thread, often found in IoT and embedded devices running Linux kernels.

Potential Impact

For European organizations, the impact of CVE-2024-56602 depends on the deployment of Linux systems utilizing the IEEE 802.15.4 networking stack. This includes industrial control systems, smart building infrastructure, IoT gateways, and embedded devices that rely on low-power wireless communications. Exploitation could allow local attackers with limited privileges to escalate their access to kernel-level control, potentially leading to full system compromise, data breaches, or disruption of critical services. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as manufacturing, energy, healthcare, and smart city infrastructure could face significant operational and security risks. Additionally, the vulnerability could be leveraged to pivot within networks or disrupt wireless sensor networks integral to operational technology (OT) environments. Although exploitation requires local access, compromised devices in distributed environments could serve as footholds for broader attacks. The absence of known exploits reduces immediate risk, but the high severity and kernel-level impact necessitate prompt attention.

Mitigation Recommendations

European organizations should prioritize patching affected Linux kernel versions to incorporate the fix that clears the dangling sk pointer in ieee802154_create(). Since the vulnerability requires local access, organizations should also enforce strict access controls and limit user privileges on systems running the affected kernel versions. Network segmentation should be employed to isolate devices using IEEE 802.15.4 protocols from general IT networks to reduce attack surface. Monitoring and logging of local access attempts and kernel anomalies can help detect potential exploitation attempts. For embedded and IoT devices, coordinate with vendors to ensure timely firmware updates. Where patching is not immediately feasible, consider disabling or restricting the use of IEEE 802.15.4 networking features if they are not critical to operations. Conduct thorough inventory and risk assessments of devices using this protocol stack to identify exposure. Employ kernel hardening techniques and security modules (e.g., SELinux, AppArmor) to limit the impact of potential kernel exploits. Finally, maintain up-to-date backups and incident response plans tailored to kernel-level compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T14:03:06.011Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf372

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 7/2/2025, 11:14:37 PM

Last updated: 7/26/2025, 4:20:01 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats