CVE-2024-26951 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV5.5
EPSS
0.0%
top 95.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateSep 18
Description
In the Linux kernel, the following vulnerability has been resolved:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
If all peers are removed via wg_peer_remove_all(), rather than setting
peer_list to empty, the peer is added to a temporary list with a head on
the stack of wg_peer_remove_all(). If a netlink dump is resumed and the
cursored peer is one that has been removed via wg_peer_remove_all(), it
will iterate from that peer and then attempt to dump freed peers…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages13 packages
▶CVEListV5linux/linuxe7096c131e5161fa3b8e52a650d7719d2857adfd — f52be46e3e6ecefc2539119784324f0cbc09620a+7
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
15📋Vendor Advisories
16💬Community
1Bugzilla▶
CVE-2024-26951 kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list↗2024-05-01