cve/2024/CVE-2024-36971.md

20 lines
1.4 KiB
Markdown
Raw Normal View History

2024-06-22 09:37:59 +00:00
### [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=a87cb3e48ee8%3C%20051c0bde9f04%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the Linux kernel, the following vulnerability has been resolved:net: fix __dst_negative_advice() race__dst_negative_advice() does not enforce proper RCU rules whensk->dst_cache must be cleared, leading to possible UAF.RCU rules are that we must first clear sk->sk_dst_cache,then call dst_release(old_dst).Note that sk_dst_reset(sk) is implementing this protocol correctly,while __dst_negative_advice() uses the wrong order.Given that ip6_negative_advice() has special logicagainst RTF_CACHE, this means each of the three ->negative_advice()existing methods must perform the sk_dst_reset() themselves.Note the check against NULL dst is centralized in__dst_negative_advice(), there is no need to duplicateit in various callbacks.Many thanks to Clement Lecigne for tracking this issue.This old bug became visible after the blamed commit, using UDP sockets.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/bygregonline/devsec-fastapi-report
2024-06-22 09:37:59 +00:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2024-08-07 19:02:05 +00:00
- https://github.com/tanjiti/sec_profile
2024-06-22 09:37:59 +00:00