{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-56661","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-27T15:00:39.843Z","datePublished":"2024-12-27T15:06:23.928Z","dateUpdated":"2025-11-03T20:52:07.361Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T10:01:25.583Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix NULL deref in cleanup_bearer()\n\nsyzbot found [1] that after blamed commit, ub->ubsock->sk\nwas NULL when attempting the atomic_dec() :\n\natomic_dec(&tipc_net(sock_net(ub->ubsock->sk))->wq_count);\n\nFix this by caching the tipc_net pointer.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 0 UID: 0 PID: 5896 Comm: kworker/0:3 Not tainted 6.13.0-rc1-next-20241203-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events cleanup_bearer\n RIP: 0010:read_pnet include/net/net_namespace.h:387 [inline]\n RIP: 0010:sock_net include/net/sock.h:655 [inline]\n RIP: 0010:cleanup_bearer+0x1f7/0x280 net/tipc/udp_media.c:820\nCode: 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 3c f7 99 f6 48 8b 1b 48 83 c3 30 e8 f0 e4 60 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 1a f7 99 f6 49 83 c7 e8 48 8b 1b\nRSP: 0018:ffffc9000410fb70 EFLAGS: 00010206\nRAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88802fe45a00\nRDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffc9000410f900\nRBP: ffff88807e1f0908 R08: ffffc9000410f907 R09: 1ffff92000821f20\nR10: dffffc0000000000 R11: fffff52000821f21 R12: ffff888031d19980\nR13: dffffc0000000000 R14: dffffc0000000000 R15: ffff88807e1f0918\nFS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000556ca050b000 CR3: 0000000031c0c000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/tipc/udp_media.c"],"versions":[{"version":"4e69457f9dfae67435f3ccf29008768eae860415","lessThan":"d1d4dfb189a115734bff81c411bc58d9e348db7d","status":"affected","versionType":"git"},{"version":"650ee9a22d7a2de8999fac2d45983597a0c22359","lessThan":"a771f349c95d3397636861a0a6462d4a7a7ecb25","status":"affected","versionType":"git"},{"version":"d2a4894f238551eae178904e7f45af87577074fd","lessThan":"07b569eda6fe6a1e83be5a587abee12d1303f95e","status":"affected","versionType":"git"},{"version":"d62d5180c036eeac09f80660edc7a602b369125f","lessThan":"754ec823ee53422361da7958a8c8bf3275426912","status":"affected","versionType":"git"},{"version":"d00d4470bf8c4282617a3a10e76b20a9c7e4cffa","lessThan":"89ecda492d0a37fd00aaffc4151f1f44c26d93ac","status":"affected","versionType":"git"},{"version":"e48b211c4c59062cb6dd6c2c37c51a7cc235a464","lessThan":"a852c82eda4991e21610837aaa160965be71f5cc","status":"affected","versionType":"git"},{"version":"6a2fa13312e51a621f652d522d7e2df7066330b6","lessThan":"b04d86fff66b15c07505d226431f808c15b1703c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/tipc/udp_media.c"],"versions":[{"version":"5.4.287","lessThan":"5.4.288","status":"affected","versionType":"semver"},{"version":"5.10.231","lessThan":"5.10.232","status":"affected","versionType":"semver"},{"version":"5.15.174","lessThan":"5.15.175","status":"affected","versionType":"semver"},{"version":"6.1.120","lessThan":"6.1.121","status":"affected","versionType":"semver"},{"version":"6.6.66","lessThan":"6.6.67","status":"affected","versionType":"semver"},{"version":"6.12.5","lessThan":"6.12.6","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.287","versionEndExcluding":"5.4.288"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.231","versionEndExcluding":"5.10.232"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.174","versionEndExcluding":"5.15.175"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.120","versionEndExcluding":"6.1.121"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.66","versionEndExcluding":"6.6.67"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.5","versionEndExcluding":"6.12.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d1d4dfb189a115734bff81c411bc58d9e348db7d"},{"url":"https://git.kernel.org/stable/c/a771f349c95d3397636861a0a6462d4a7a7ecb25"},{"url":"https://git.kernel.org/stable/c/07b569eda6fe6a1e83be5a587abee12d1303f95e"},{"url":"https://git.kernel.org/stable/c/754ec823ee53422361da7958a8c8bf3275426912"},{"url":"https://git.kernel.org/stable/c/89ecda492d0a37fd00aaffc4151f1f44c26d93ac"},{"url":"https://git.kernel.org/stable/c/a852c82eda4991e21610837aaa160965be71f5cc"},{"url":"https://git.kernel.org/stable/c/b04d86fff66b15c07505d226431f808c15b1703c"}],"title":"tipc: fix NULL deref in cleanup_bearer()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-56661","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-10-01T20:00:02.292405Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T20:07:10.233Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:52:07.361Z"}}]}}