CVE-2024-46800Use After Free in Linux

CWE-416Use After Free45 documents9 sources
Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV7.0OSV5.5
EPSS
0.0%
top 97.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18
Latest updateAug 14

Description

In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN. The packet is dropped but qdisc_tree_reduce_backlog() is not called to update the parent's q.qlen, leading to the similar use-after-free as Commit e04991a48dbaf382 ("netem: fix return value if duplicate enqueue fails") Commands to trigger KASAN UaF: ip link add type dummy ip link set lo u

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages15 packages

Patches

🔴Vulnerability Details

21
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-gkeop vulnerabilities2024-12-12
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2024-12-10
OSV
linux-intel-iotg, linux-intel-iotg-5.15 vulnerabilities2024-12-09
OSV
linux-oracle vulnerabilities2024-11-25

📋Vendor Advisories

23
CISA ICS
Siemens Third-Party Components in SINEC OS2025-08-14
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2024-468002025-02-26
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (GKE) vulnerabilities2024-12-12
Ubuntu
Linux kernel vulnerabilities2024-12-10