Bug 2309837 (CVE-2024-44974) - CVE-2024-44974 kernel: mptcp: pm: avoid possible UaF when selecting endp
Summary: CVE-2024-44974 kernel: mptcp: pm: avoid possible UaF when selecting endp
Keywords:
Status: NEW
Alias: CVE-2024-44974
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2309944
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-04 20:21 UTC by OSIDB Bzimport
Modified: 2024-09-04 22:45 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-09-04 20:21:17 UTC
In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: avoid possible UaF when selecting endp

select_local_address() and select_signal_address() both select an
endpoint entry from the list inside an RCU protected section, but return
a reference to it, to be read later on. If the entry is dereferenced
after the RCU unlock, reading info could cause a Use-after-Free.

A simple solution is to copy the required info while inside the RCU
protected section to avoid any risk of UaF later. The address ID might
need to be modified later to handle the ID0 case later, so a copy seems
OK to deal with.


Note You need to log in before you can comment on or make changes to this bug.