Executive Summary

Informations
Name CVE-2024-42108 First vendor Publication 2024-07-30
Vendor Cve Last vendor Modification 2024-12-19

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: rswitch: Avoid use-after-free in rswitch_poll()

The use-after-free is actually in rswitch_tx_free(), which is inlined in rswitch_poll(). Since `skb` and `gq->skbs[gq->dirty]` are in fact the same pointer, the skb is first freed using dev_kfree_skb_any(), then the value in skb->len is used to update the interface statistics.

Let's move around the instructions to use skb->len before the skb is freed.

This bug is trivial to reproduce using KFENCE. It will trigger a splat every few packets. A simple ARP request or ICMP echo request is enough.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42108

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/4a41bb9f2b402469d425a1c13359d3b3ea4e6403
https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b
https://git.kernel.org/stable/c/9a0c28efeec6383ef22e97437616b920e7320b67
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Date Informations
2025-01-08 03:04:05
  • Multiple Updates
2025-01-07 03:03:38
  • Multiple Updates
2024-12-24 21:20:44
  • Multiple Updates
2024-12-20 00:20:41
  • Multiple Updates
2024-12-12 03:05:13
  • Multiple Updates
2024-11-25 09:23:19
  • Multiple Updates
2024-11-22 21:22:33
  • Multiple Updates
2024-11-21 21:22:04
  • Multiple Updates
2024-11-20 02:58:50
  • Multiple Updates
2024-11-14 02:59:08
  • Multiple Updates
2024-11-09 02:59:09
  • Multiple Updates
2024-10-26 02:56:33
  • Multiple Updates
2024-10-25 02:58:28
  • Multiple Updates
2024-10-23 02:57:41
  • Multiple Updates
2024-10-03 02:52:59
  • Multiple Updates
2024-10-02 02:51:23
  • Multiple Updates
2024-09-15 02:49:06
  • Multiple Updates
2024-09-12 02:48:38
  • Multiple Updates
2024-09-07 02:47:37
  • Multiple Updates
2024-09-06 02:46:47
  • Multiple Updates
2024-09-04 02:50:00
  • Multiple Updates
2024-08-22 02:48:30
  • Multiple Updates
2024-08-22 00:27:42
  • Multiple Updates
2024-07-30 17:27:23
  • Multiple Updates
2024-07-30 13:27:27
  • First insertion