Vulnerability Details CVE-2024-53206
In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with
__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().
Then, oreq should be passed to reqsk_put() instead of req; otherwise
use-after-free of nreq could happen when reqsk is migrated but the
retry attempt failed (e.g. due to timeout).
Let's pass oreq to reqsk_put().
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.8%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2024-53206
-
cpe:2.3:o:linux:linux_kernel:5.15.170
-
cpe:2.3:o:linux:linux_kernel:5.15.171
-
cpe:2.3:o:linux:linux_kernel:5.15.172
-
cpe:2.3:o:linux:linux_kernel:5.15.173
-
cpe:2.3:o:linux:linux_kernel:6.1.115
-
cpe:2.3:o:linux:linux_kernel:6.1.116
-
cpe:2.3:o:linux:linux_kernel:6.1.117
-
cpe:2.3:o:linux:linux_kernel:6.1.118
-
cpe:2.3:o:linux:linux_kernel:6.1.119
-
cpe:2.3:o:linux:linux_kernel:6.11.10
-
cpe:2.3:o:linux:linux_kernel:6.11.6
-
cpe:2.3:o:linux:linux_kernel:6.11.7
-
cpe:2.3:o:linux:linux_kernel:6.11.8
-
cpe:2.3:o:linux:linux_kernel:6.11.9
-
cpe:2.3:o:linux:linux_kernel:6.12
-
cpe:2.3:o:linux:linux_kernel:6.12.1
-
cpe:2.3:o:linux:linux_kernel:6.6.59
-
cpe:2.3:o:linux:linux_kernel:6.6.60
-
cpe:2.3:o:linux:linux_kernel:6.6.61
-
cpe:2.3:o:linux:linux_kernel:6.6.62
-
cpe:2.3:o:linux:linux_kernel:6.6.63