๐Ÿ” CVE Alert

CVE-2024-45016

UNKNOWN 0.0

netem: fix return value if duplicate enqueue fails

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that can lead to a use-after-free. This commit made netem_enqueue() always return NET_XMIT_SUCCESS when a packet is duplicated, which can cause the parent qdisc's q.qlen to be mistakenly incremented. When this happens qlen_notify() may be skipped on the parent during destruction, leaving a dangling pointer for some classful qdiscs like DRR. There are two ways for the bug happen: - If the duplicated packet is dropped by rootq->enqueue() and then the original packet is also dropped. - If rootq->enqueue() sends the duplicated packet to a different qdisc and the original packet is dropped. In both cases NET_XMIT_SUCCESS is returned even though no packets are enqueued at the netem qdisc. The fix is to defer the enqueue of the duplicate packet until after the original packet has been guaranteed to return NET_XMIT_SUCCESS.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5845f706388a4cde0f6b80f9e5d33527e942b7d9 < 759e3e8c4a6a6b4e52ebc4547123a457f0ce90d4 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < 52d99a69f3d556c6426048c9d481b912205919d8 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < 0486d31dd8198e22b63a4730244b38fffce6d469 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < 577d6c0619467fe90f7e8e57e45cb5bd9d936014 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < e5bb2988a310667abed66c7d3ffa28880cf0f883 5845f706388a4cde0f6b80f9e5d33527e942b7d9 < c07ff8592d57ed258afee5a5e04991a48dbaf382 a550a01b8af856f2684b0f79d552f5119eb5006c 009510a90e230bb495f3fe25c7db956679263b07 4de7d30668cb8b06330992e1cd336f91700a2ce7 d1dd2e15c85e890a1cc9bde5ba07ae63331e5c73 0148fe458b5705e2fea7cb88294fed7e36066ca2
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/759e3e8c4a6a6b4e52ebc4547123a457f0ce90d4 git.kernel.org: https://git.kernel.org/stable/c/c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d git.kernel.org: https://git.kernel.org/stable/c/52d99a69f3d556c6426048c9d481b912205919d8 git.kernel.org: https://git.kernel.org/stable/c/0486d31dd8198e22b63a4730244b38fffce6d469 git.kernel.org: https://git.kernel.org/stable/c/577d6c0619467fe90f7e8e57e45cb5bd9d936014 git.kernel.org: https://git.kernel.org/stable/c/e5bb2988a310667abed66c7d3ffa28880cf0f883 git.kernel.org: https://git.kernel.org/stable/c/c07ff8592d57ed258afee5a5e04991a48dbaf382 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html