CVE-2024-36974

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2024
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP<br /> <br /> If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,<br /> taprio_parse_mqprio_opt() must validate it, or userspace<br /> can inject arbitrary data to the kernel, the second time<br /> taprio_change() is called.<br /> <br /> First call (with valid attributes) sets dev-&gt;num_tc<br /> to a non zero value.<br /> <br /> Second call (with arbitrary mqprio attributes)<br /> returns early from taprio_parse_mqprio_opt()<br /> and bad things can happen.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.2 (including) 5.4.279 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.221 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.162 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.95 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*