Bug 2292331 (CVE-2024-36971)

Summary: CVE-2024-36971 kernel: net: kernel: UAF in network route management
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, gcovolo, hkrzesin, jarod, jburrell, jdenham, jfaracco, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, martin.hecht, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, saroy, scweaver, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 6.10-rc2 Doc Type: If docs needed, set a value
Doc Text:
A use-after-free flaw was found in the Linux kernel's network route management. This flaw allows an attacker to alter the behavior of certain network connections.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2296663, 2296664    
Bug Blocks: 2292332    

Description Pedro Sampaio 2024-06-14 04:02:37 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

The Linux kernel CVE team has assigned CVE-2024-36971 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/T

Comment 7 errata-xmlrpc 2024-08-08 04:45:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:5102 https://access.redhat.com/errata/RHSA-2024:5102

Comment 8 errata-xmlrpc 2024-08-08 04:57:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:5101 https://access.redhat.com/errata/RHSA-2024:5101

Comment 15 errata-xmlrpc 2024-08-13 00:11:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:5256 https://access.redhat.com/errata/RHSA-2024:5256

Comment 16 errata-xmlrpc 2024-08-13 00:17:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:5257 https://access.redhat.com/errata/RHSA-2024:5257

Comment 17 errata-xmlrpc 2024-08-13 00:27:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:5255 https://access.redhat.com/errata/RHSA-2024:5255

Comment 18 errata-xmlrpc 2024-08-13 00:28:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2024:5259 https://access.redhat.com/errata/RHSA-2024:5259

Comment 19 errata-xmlrpc 2024-08-13 00:29:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Advanced Update Support

Via RHSA-2024:5261 https://access.redhat.com/errata/RHSA-2024:5261

Comment 20 errata-xmlrpc 2024-08-13 07:26:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:5266 https://access.redhat.com/errata/RHSA-2024:5266

Comment 21 errata-xmlrpc 2024-08-13 14:26:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:5282 https://access.redhat.com/errata/RHSA-2024:5282

Comment 22 errata-xmlrpc 2024-08-13 14:33:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:5281 https://access.redhat.com/errata/RHSA-2024:5281

Comment 23 errata-xmlrpc 2024-08-14 00:17:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5365 https://access.redhat.com/errata/RHSA-2024:5365

Comment 24 errata-xmlrpc 2024-08-14 00:37:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5364 https://access.redhat.com/errata/RHSA-2024:5364

Comment 25 errata-xmlrpc 2024-08-14 00:51:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:5363 https://access.redhat.com/errata/RHSA-2024:5363

Comment 26 errata-xmlrpc 2024-08-14 11:24:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:5388 https://access.redhat.com/errata/RHSA-2024:5388

Comment 27 errata-xmlrpc 2024-08-19 01:12:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:5519 https://access.redhat.com/errata/RHSA-2024:5519

Comment 28 errata-xmlrpc 2024-08-19 01:22:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:5523 https://access.redhat.com/errata/RHSA-2024:5523

Comment 29 errata-xmlrpc 2024-08-19 01:22:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5521 https://access.redhat.com/errata/RHSA-2024:5521

Comment 30 errata-xmlrpc 2024-08-19 01:22:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:5520 https://access.redhat.com/errata/RHSA-2024:5520

Comment 31 errata-xmlrpc 2024-08-19 05:40:44 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2024:5200 https://access.redhat.com/errata/RHSA-2024:5200

Comment 32 errata-xmlrpc 2024-08-19 05:49:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:5522 https://access.redhat.com/errata/RHSA-2024:5522

Comment 33 errata-xmlrpc 2024-08-19 18:23:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions

Via RHSA-2024:5582 https://access.redhat.com/errata/RHSA-2024:5582

Comment 34 errata-xmlrpc 2024-08-20 15:21:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.16

Via RHSA-2024:5422 https://access.redhat.com/errata/RHSA-2024:5422

Comment 35 errata-xmlrpc 2024-08-22 11:41:59 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.14

Via RHSA-2024:5433 https://access.redhat.com/errata/RHSA-2024:5433

Comment 36 errata-xmlrpc 2024-08-22 11:42:54 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.15

Via RHSA-2024:5439 https://access.redhat.com/errata/RHSA-2024:5439

Comment 37 errata-xmlrpc 2024-08-22 11:43:21 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.13

Via RHSA-2024:5444 https://access.redhat.com/errata/RHSA-2024:5444

Comment 38 errata-xmlrpc 2024-08-26 11:22:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:5858 https://access.redhat.com/errata/RHSA-2024:5858

Comment 40 Martin Hecht 2024-08-28 08:16:47 UTC
On https://access.redhat.com/security/cve/CVE-2024-36971 this CVE is marked as "high risk and there are known public exploits leveraging this vulnerability" - could you please clarify if it is just rated at high risk based on Googles statement (https://therecord.media/android-zero-day-google-fix-august-patch) or are there really already public exploits around?