CVE-2024-44986

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible UAF in ip6_finish_output2() If skb_expand_head() returns NULL, skb has been freed and associated dst/idev could also have been freed. We need to hold rcu_read_lock() to make sure the dst and associated idev are alive.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*

History

05 Sep 2024, 17:54

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/3574d28caf9a09756ae87ad1ea096c6f47b6101e - () https://git.kernel.org/stable/c/3574d28caf9a09756ae87ad1ea096c6f47b6101e - Patch
References () https://git.kernel.org/stable/c/56efc253196751ece1fc535a5b582be127b0578a - () https://git.kernel.org/stable/c/56efc253196751ece1fc535a5b582be127b0578a - Patch
References () https://git.kernel.org/stable/c/6ab6bf731354a6fdbaa617d1ec194960db61cf3b - () https://git.kernel.org/stable/c/6ab6bf731354a6fdbaa617d1ec194960db61cf3b - Patch
References () https://git.kernel.org/stable/c/da273b377ae0d9bd255281ed3c2adb228321687b - () https://git.kernel.org/stable/c/da273b377ae0d9bd255281ed3c2adb228321687b - Patch
References () https://git.kernel.org/stable/c/e891b36de161fcd96f12ff83667473e5067b9037 - () https://git.kernel.org/stable/c/e891b36de161fcd96f12ff83667473e5067b9037 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

05 Sep 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: se ha corregido un posible UAF en ip6_finish_output2() Si skb_expand_head() devuelve NULL, se ha liberado skb y también se podría haber liberado el dst/idev asociado. Necesitamos mantener rcu_read_lock() para asegurarnos de que el dst y el idev asociado estén activos.

04 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 20:15

Updated : 2024-09-05 17:54


NVD link : CVE-2024-44986

Mitre link : CVE-2024-44986

CVE.ORG link : CVE-2024-44986


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free