CVE-2024-50036
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: do not delay dst_entries_add() in dst_release()<br />
<br />
dst_entries_add() uses per-cpu data that might be freed at netns<br />
dismantle from ip6_route_net_exit() calling dst_entries_destroy()<br />
<br />
Before ip6_route_net_exit() can be called, we release all<br />
the dsts associated with this netns, via calls to dst_release(),<br />
which waits an rcu grace period before calling dst_destroy()<br />
<br />
dst_entries_add() use in dst_destroy() is racy, because<br />
dst_entries_destroy() could have been called already.<br />
<br />
Decrementing the number of dsts must happen sooner.<br />
<br />
Notes:<br />
<br />
1) in CONFIG_XFRM case, dst_destroy() can call<br />
dst_release_immediate(child), this might also cause UAF<br />
if the child does not have DST_NOCOUNT set.<br />
IPSEC maintainers might take a look and see how to address this.<br />
<br />
2) There is also discussion about removing this count of dst,<br />
which might happen in future kernels.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.10.50 (including) | 3.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.12.26 (including) | 3.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.14.14 (including) | 3.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.15.7 (including) | 3.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16 (including) | 6.6.57 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3c7c918ec0aa3555372c5a57f18780b7a96c5cfc
- https://git.kernel.org/stable/c/547087307bc19417b4f2bc85ba9664a3e8db5a6a
- https://git.kernel.org/stable/c/a60db84f772fc3a906c6c4072f9207579c41166f
- https://git.kernel.org/stable/c/ac888d58869bb99753e7652be19a151df9ecb35d
- https://git.kernel.org/stable/c/e3915f028b1f1c37e87542e5aadd33728c259d96
- https://git.kernel.org/stable/c/eae7435b48ffc8e9be0ff9cfeae40af479a609dd
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



