First published: Sun May 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ax25: fix use-after-free bugs caused by ax25_ds_del_timer When the ax25 device is detaching, the ax25_dev_device_down() calls ax25_ds_del_timer() to cleanup the slave_timer. When the timer handler is running, the ax25_ds_del_timer() that calls del_timer() in it will return directly. As a result, the use-after-free bugs could happen, one of the scenarios is shown below: (Thread 1) | (Thread 2) | ax25_ds_timeout() ax25_dev_device_down() | ax25_ds_del_timer() | del_timer() | ax25_dev_put() //FREE | | ax25_dev-> //USE In order to mitigate bugs, when the device is detaching, use timer_shutdown_sync() to stop the timer.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<6.6.26 | |
Linux Kernel | >=6.7<6.8.5 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1<=6.1.128-1 | 6.12.12-1 6.12.15-1 |
Ensure that /etc/modprobe.d/blacklist-rare-network.conf contains following lines: # ax25 alias net-pf-3 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35887 is categorized with a moderate severity level due to potential use-after-free vulnerabilities.
To mitigate CVE-2024-35887, update to the latest versions of the Linux kernel, specifically 6.12.11-1 or 6.12.12-1.
CVE-2024-35887 affects Linux kernel versions from 2.6.12 to 6.6.26 and includes versions 6.7 and 6.9-rc1 and 6.9-rc2.
In CVE-2024-35887, a use-after-free vulnerability allows access to freed memory, potentially leading to system instability or exploitation.
Yes, Debian Linux distributions are affected and have provided specific package versions to resolve the vulnerability.