Логотип exploitDog
bind:CVE-2024-36904
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-36904

Количество 88

Количество 88

ubuntu логотип

CVE-2024-36904

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

EPSS: Низкий
redhat логотип

CVE-2024-36904

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2024-36904

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refc

EPSS: Низкий
debian логотип

CVE-2024-36904

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
fstec логотип

BDU:2024-04557

около 1 года назад

Уязвимость функции tcp_twsk_unique() реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4276-1

6 месяцев назад

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4265-1

6 месяцев назад

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4241-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4230-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4179-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4177-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4217-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4129-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4227-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4220-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4206-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4141-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4120-1

7 месяцев назад

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4208-1

7 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0187-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-36904

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

1%
Низкий
около 1 года назад
redhat логотип
CVE-2024-36904

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount...

CVSS3: 7
1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-36904

In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique() with nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's sk_refcnt after putting it into ehash and releasing the bucket lock. Thus, there is a small race window where other threads could try to reuse the port during connect() and call sock_hold() in tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that happens, the refcnt taken by tcp_twsk_unique() is overwritten and sock_put() will cause underflow, triggering a real use-after-free somewhere else. To avoid the use-after-free, we need to use refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing the port if it returns false. [0]: refcount_t: addition on 0; use-after-free. WARNING: CPU: 0 PID: 1039313 at lib/refc

1%
Низкий
около 1 года назад
debian логотип
CVE-2024-36904

In the Linux kernel, the following vulnerability has been resolved: t ...

1%
Низкий
около 1 года назад
fstec логотип
BDU:2024-04557

Уязвимость функции tcp_twsk_unique() реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.6
1%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4276-1

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4265-1

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4241-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4230-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4179-1

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4177-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4217-1

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4129-1

Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4227-1

Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4220-1

Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4206-1

Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4141-1

Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4120-1

Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4208-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0187-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

5 месяцев назад

Уязвимостей на страницу