Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45016— netem: fix return value if duplicate enqueue fails

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-45016

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netem: fix return value if duplicate enqueue fails
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until after the original packet has been guaranteed to return NET_XMIT_SUCCESS.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于netem组件存在重复入队失败返回值问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5845f706388a4cde0f6b80f9e5d33527e942b7d9 ~ 759e3e8c4a6a6b4e52ebc4547123a457f0ce90d4 -
LinuxLinux 5.0 -

II. Public POCs for CVE-2024-45016

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-45016

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-11 · 23 CVEs total

CVE-2024-45021memcg_write_event_control(): fix a user-triggerable oops
CVE-2024-45010mptcp: pm: only mark 'subflow' endp as available
CVE-2024-45009mptcp: pm: only decrement add_addr_accepted for MPJ req
CVE-2024-45011char: xillybus: Check USB endpoints when probing device
CVE-2024-45013nvme: move stopping keep-alive into nvme_uninit_ctrl()
CVE-2024-45012nouveau/firmware: use dma non-coherent allocator
CVE-2024-45015drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
CVE-2024-45014s390/boot: Avoid possible physmem_info segment corruption
CVE-2024-45018netfilter: flowtable: initialise extack before use
CVE-2024-45017net/mlx5: Fix IPsec RoCE MPV trace call
CVE-2024-45019net/mlx5e: Take state lock during tx timeout reporter
CVE-2024-46672wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
CVE-2024-45020bpf: Fix a kernel verifier crash in stacksafe()
CVE-2024-45023md/raid1: Fix data corruption for degraded array with slow disk
CVE-2024-45022mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0
CVE-2024-45024mm/hugetlb: fix hugetlb vs. core-mm PT locking
CVE-2024-45026s390/dasd: fix error recovery leading to data corruption on ESE devices
CVE-2024-45025fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
CVE-2024-45027usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()
CVE-2024-45029i2c: tegra: Do not mark ACPI devices as irq safe

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-45016

No comments yet


Leave a comment