THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26739

net/sched: act_mirred: don't override retval if we already lost the skb

AssignerLinux
Reserved2024-02-19
Published2024-04-03
Updated2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and returning SHOT will lead to UaF. Move the retval override to the error path which actually need it.

Product status

Default status
unaffected

e5cf1baf92cb before 28cdbbd38a44
affected

e5cf1baf92cb before f4e294bbdca8
affected

e5cf1baf92cb before 166c2c8a6a4d
affected

Default status
affected

4.19
affected

Any version before 4.19
unaffected

6.6.19
unaffected

6.7.7
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d

https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7

https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210

cve.org CVE-2024-26739

nvd.nist.gov CVE-2024-26739

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26739
© Copyright 2024 THREATINT. Made in Cyprus with +