7.8
CVE-2024-36971
- EPSS 0.34%
- Published 10.06.2024 09:15:09
- Last modified 05.11.2025 19:19:56
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version10.0
Linux ≫ Linux Kernel Version >= 4.6 < 4.19.316
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.278
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.219
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.161
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.94
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.34
Linux ≫ Linux Kernel Version >= 6.7 < 6.9.4
07.08.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog
Android Kernel Remote Code Execution Vulnerability
VulnerabilityAndroid contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.
DescriptionApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Required actions| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.557 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.