CVE-2024-26739 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV8.8
EPSS
0.0%
top 98.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Latest updateSep 2
Description
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_mirred: don't override retval if we already lost the skb
If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.
Move the retval override to the error path which actually need it.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
▶CVEListV5linux/linuxe5cf1baf92cb785b90390db1c624948e70c8b8bd — 0117fe0a4615a7c8d30d6ebcbf87332fbe63e6fd+6
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
12📋Vendor Advisories
12💬Community
1Bugzilla▶
CVE-2024-26739 kernel: net/sched: act_mirred: don't override retval if we already lost the skb↗2024-04-04