CVE-2024-45016Use After Free in Linux

CWE-416Use After Free33 documents7 sources
Severity
5.5MEDIUMNVD
OSV7.8OSV7.0
EPSS
0.0%
top 92.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateDec 12

Description

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages14 packages

Patches

🔴Vulnerability Details

16
OSV
linux-gkeop vulnerabilities2024-12-12
OSV
linux-iot vulnerabilities2024-11-19
OSV
linux-gke vulnerability2024-11-14
OSV
linux-azure-6.8 vulnerabilities2024-11-01
OSV
linux-azure-fde-5.15 vulnerabilities2024-10-31

📋Vendor Advisories

16
Ubuntu
Linux kernel (GKE) vulnerabilities2024-12-12
Ubuntu
Linux kernel (IoT) vulnerabilities2024-11-19
Ubuntu
Linux kernel vulnerabilities2024-11-01
Ubuntu
Linux kernel vulnerabilities2024-10-31
Ubuntu
Linux kernel (GKE) vulnerabilities2024-10-21