In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_mirred: don't override retval if we already lost the skb
If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.
Move the retval override to the error path which actually need it.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Sep 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat enterprise Linux
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-04-03T17:00:24.879Z
Updated: 2024-11-05T09:14:51.142Z
Reserved: 2024-02-19T14:20:24.166Z
Link: CVE-2024-26739
Vulnrichment
Updated: 2024-08-02T00:14:13.024Z
NVD
Status : Awaiting Analysis
Published: 2024-04-03T17:15:51.367
Modified: 2024-04-03T17:24:18.150
Link: CVE-2024-26739
Redhat