⚠ Actively exploited
Added to CISA KEV on 2024-08-07. Federal agencies required to patch by 2024-08-28. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2024-36971 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV5.5
EPSS
0.5%
top 33.99%
CISA KEV
KEV
Added 2024-08-07
Due 2024-08-28
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJun 10
KEV addedAug 7
KEV dueAug 28
Latest updateApr 8
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
In the Linux kernel, the following vulnerability has been resolved:
net: fix __dst_negative_advice() race
__dst_negative_advice() does not enforce proper RCU rules when
sk->dst_cache must be cleared, leading to possible UAF.
RCU rules are that we must first clear sk->sk_dst_cache,
then call dst_release(old_dst).
Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.
Given that ip6_negative_advice() has special logic
against RT…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages12 packages
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
25OSV▶
linux, linux-aws, linux-aws-hwe, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities↗2024-10-15