CVE-2024-56600
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's IPv6 socket creation function. When inet6_create() fails during socket allocation, it leaves a dangling pointer in the sock object that can be accessed later, potentially leading to memory corruption. This affects all Linux systems with IPv6 enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to privilege escalation, denial of service, or arbitrary code execution in kernel context.
Likely Case
Kernel panic or system crash causing denial of service.
If Mitigated
Limited impact due to exploit complexity and need for local access, but still potential for system instability.
🎯 Exploit Status
Exploitation requires triggering the specific error condition in inet6_create() and then accessing the dangling pointer before memory is reused.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions referenced in git commits
Vendor Advisory: https://git.kernel.org/stable/c/276a473c956fb55a6f3affa9ff232e10fffa7b43
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable IPv6
linuxDisable IPv6 networking to prevent triggering the vulnerable code path
echo 'net.ipv6.conf.all.disable_ipv6 = 1' >> /etc/sysctl.conf
sysctl -p
🧯 If You Can't Patch
- Implement strict access controls to limit local user accounts
- Monitor system logs for kernel panics or unusual socket creation failures
🔍 How to Verify
Check if Vulnerable:
Check kernel version against distribution security advisories or run: uname -r and compare with known vulnerable versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- OOM killer activity
- Socket creation failures in system logs
Network Indicators:
- Unusual IPv6 socket creation patterns
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "use-after-free")
🔗 References
- https://git.kernel.org/stable/c/276a473c956fb55a6f3affa9ff232e10fffa7b43
- https://git.kernel.org/stable/c/35360255ca30776dee34d9fa764cffa24d0a5f65
- https://git.kernel.org/stable/c/706b07b7b37f886423846cb38919132090bc40da
- https://git.kernel.org/stable/c/79e16a0d339532ea832d85798eb036fc4f9e0cea
- https://git.kernel.org/stable/c/9df99c395d0f55fb444ef39f4d6f194ca437d884
- https://git.kernel.org/stable/c/f2709d1271cfdf55c670ab5c5982139ab627ddc7
- https://git.kernel.org/stable/c/f44fceb71d72d29fb00e0ac84cdf9c081b03cd06
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html