CVE-2024-26739
HIGHDebian Linux < 5.10.238 - Use After Free
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and returning SHOT will lead to UaF. Move the retval override to the error path which actually need it.
References (8)
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
1.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-416
Status
published
Affected Products (11)
debian/debian_linux
linux/linux_kernel
< 5.10.238
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/Kernel
< 5.10.238linux
linux/Kernel
< 5.15.182linux
linux/Kernel
< 6.1.136linux
linux/Kernel
< 6.6.19linux
linux/Kernel
< 6.7.7linux
Timeline
Published
Apr 03, 2024
Tracked Since
Feb 18, 2026