CVE-2024-42108

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
30/07/2024
Last modified:
17/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: rswitch: Avoid use-after-free in rswitch_poll()<br /> <br /> The use-after-free is actually in rswitch_tx_free(), which is inlined in<br /> rswitch_poll(). Since `skb` and `gq-&gt;skbs[gq-&gt;dirty]` are in fact the<br /> same pointer, the skb is first freed using dev_kfree_skb_any(), then the<br /> value in skb-&gt;len is used to update the interface statistics.<br /> <br /> Let&amp;#39;s move around the instructions to use skb-&gt;len before the skb is<br /> freed.<br /> <br /> This bug is trivial to reproduce using KFENCE. It will trigger a splat<br /> every few packets. A simple ARP request or ICMP echo request is enough.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.9.9 (excluding)