CVE-2024-44974

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
04/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: pm: avoid possible UaF when selecting endp<br /> <br /> select_local_address() and select_signal_address() both select an<br /> endpoint entry from the list inside an RCU protected section, but return<br /> a reference to it, to be read later on. If the entry is dereferenced<br /> after the RCU unlock, reading info could cause a Use-after-Free.<br /> <br /> A simple solution is to copy the required info while inside the RCU<br /> protected section to avoid any risk of UaF later. The address ID might<br /> need to be modified later to handle the ID0 case later, so a copy seems<br /> OK to deal with.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.7 (including) 6.6.48 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*