CVE-2024-44985

In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UAF in ip6_xmit() If skb_expand_head() returns NULL, skb has been freed and the associated dst/idev could also have been freed. We must use rcu_read_lock() to prevent a possible UAF.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*

History

05 Sep 2024, 17:54

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8 - () https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8 - Patch
References () https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7 - () https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7 - Patch
References () https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17 - () https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17 - Patch
References () https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596 - () https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596 - Patch
References () https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1 - () https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1 - Patch
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

05 Sep 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6: evitar posible UAF en ip6_xmit() Si skb_expand_head() devuelve NULL, skb se ha liberado y el dst/idev asociado también podría haberse liberado. Debemos utilizar rcu_read_lock() para evitar un posible UAF.

04 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 20:15

Updated : 2024-09-05 17:54


NVD link : CVE-2024-44985

Mitre link : CVE-2024-44985

CVE.ORG link : CVE-2024-44985


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free