
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-36974 affects the Linux kernel's network scheduler component, specifically in the taprio (Time-Aware Priority Scheduler) functionality. The vulnerability was discovered in June 2024 and involves a validation issue in the TCATAPRIOATTR_PRIOMAP attribute handling (Kernel Git).
The vulnerability exists in the taprioparsemqprioopt() function where validation of the TCATAPRIOATTRPRIOMAP attribute is not properly enforced. When a second tapriochange() call is made after an initial valid call that sets dev->numtc to a non-zero value, the function may return early without proper validation, potentially allowing userspace to inject arbitrary data into the kernel (Kernel Git).
The vulnerability allows local users to potentially inject arbitrary data into the kernel through improper validation of network scheduler attributes. This could lead to system instability or potential privilege escalation (NVD).
The vulnerability has been patched in various Linux kernel versions. Fixed versions include Ubuntu 24.04 LTS (6.8.0-44.44), Ubuntu 22.04 LTS (5.15.0-121.131), and Ubuntu 20.04 LTS (5.4.0-195.215). Users should update their kernel to the latest available version that includes the fix (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."