CVE-2024-50154
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-50154 is a use-after-free (UAF) vulnerability discovered in the Linux kernel's TCP subsystem, specifically related to request socket (reqsk) handling. The vulnerability was reported by Martin KaFai Lau and affects Linux kernel versions from 4.1.11 up to versions before 5.15.170, 6.1.115, 6.6.59, and 6.11.6 (NVD).

Technical details

The vulnerability stems from a race condition in the reqskqueueunlink() function. The issue was introduced by commit 83fccfc3940c which added timerpending() checks to prevent deadlocks. However, this created a race window where if reqskqueueunlink() checks timerpending() just after expiretimers() calls detachtimer(), TCP misses deltimersync() call. This can cause the reqsk timer to continue running and send multiple SYN+ACKs until expiration. The vulnerability has been assigned a CVSS v3.1 base score of 7.0 HIGH with vector AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When exploited, this vulnerability can lead to a use-after-free condition when a BPF program attached to tracetcpretransmit_synack attempts to access req->sk after it has been closed. This occurs if req->sk is closed earlier than the timer expiration (default 63s). The vulnerability can potentially lead to system crashes, information leaks, or arbitrary code execution (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed in the Linux kernel by modifying the reqskqueueunlink() function to not use timerpending() and instead passing the caller context to _inetcskreqskqueuedrop(). Users should update to kernel versions 5.15.170, 6.1.115, 6.6.59, 6.11.6 or later to address this vulnerability (Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management