Use After Free in netem Fix
CVE-2024-46800
What is CVE-2024-46800?
A vulnerability within the Linux kernel's network traffic control (netem) subsystem has been identified, exposing systems to potential use-after-free scenarios. This issue arises during packet processing in netem_dequeue(), where packets may be incorrectly managed if a specific condition is triggered, allowing for a misuse of freed memory. When netem_dequeue() enqueues a packet and receives a 'stolen' return status, the necessary backlog updates are not executed, resulting in memory management inconsistencies. This behavior can potentially be exploited by attackers to execute arbitrary code or cause system instability when specific sequences of commands are performed. The vulnerability highlights the importance of proper memory management practices in kernel development.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Linux 50612537e9ab29693122fab20fc1eed235054ffe
Linux 50612537e9ab29693122fab20fc1eed235054ffe < 295ad5afd9efc5f67b86c64fce28fb94e26dc4c9
Linux 50612537e9ab29693122fab20fc1eed235054ffe < 98c75d76187944296068d685dfd8a1e9fd8c4fdc
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved