CVE-2024-36886Use After Free in Linux

CWE-416Use After Free53 documents7 sources
Severity
7.8HIGHNVD
OSV6.5OSV5.5
EPSS
0.2%
top 57.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 30
Latest updateApr 8

Description

In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported a UAF in the tipc_buf_append() error path: BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183 Read of size 8 at addr ffff88804d2a7c80 by task poc/8034 CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

debiandebian/linux< linux 6.1.94-1 (bookworm)
NVDlinux/linux_kernel4.14.19.314+7
Debianlinux/linux_kernel< 5.10.218-1+3
Ubuntulinux/linux_kernel< 5.4.0-192.212+4
CVEListV5linux/linux1149557d64c97dc9adf3103347a1c0e8c06d3b89e19ec8ab0e25bc4803d7cc91c84e84532e2781bd+8

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

25
OSV
linux-lts-xenial vulnerabilities2025-03-13
OSV
linux-azure, linux-azure-4.15 vulnerabilities2025-03-13
OSV
linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-kvm, linux-oracle vulnerabilities2025-03-11
OSV
linux-kvm vulnerabilities2025-03-11
OSV
linux, linux-hwe vulnerabilities2025-03-11

📋Vendor Advisories

26
Palo Alto
PAN-SA-2026-0006 Informational Bulletin: Impact assessment of OSS CVEs in PAN-OS2026-04-08
Ubuntu
Linux kernel vulnerabilities2025-03-13
Ubuntu
Linux kernel vulnerabilities2025-03-13
Ubuntu
Linux kernel vulnerabilities2025-03-11
Ubuntu
Linux kernel vulnerabilities2025-03-11

💬Community

1
Bugzilla
CVE-2024-36886 kernel: TIPC message reassembly use-after-free remote code execution vulnerability2024-04-25