
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free (UAF) vulnerability has been identified in the Linux kernel's network scheduler component (CVE-2024-53057). The vulnerability exists in the qdisctreereduce_backlog function where Qdiscs with major handle ffff: are incorrectly assumed to be either root or ingress. This vulnerability was discovered by Budimir Markovic and affects Linux kernel versions from 2.6.25 through 6.11.7 (NVD).
The vulnerability stems from an invalid assumption in the qdisctreereduce_backlog function where Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is incorrect since it's valid to create egress qdiscs with major handle ffff:. For qdiscs like DRR that maintain an active class list, this can result in a use-after-free condition with a dangling class pointer. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability can lead to a use-after-free condition, potentially allowing an attacker to execute arbitrary code with elevated privileges, access sensitive information, or cause system crashes. The high CVSS score of 7.8 indicates significant potential impact on the confidentiality, integrity, and availability of the affected systems (NVD).
The proper fix involves modifying the code to stop when parent TCHROOT is reached, as this is the only way to retrieve ingress when a hierarchy without a ffff: major handle calls into qdisclookup with TCHMAJ(TCH_ROOT). Multiple patches have been released to address this vulnerability across different kernel versions (Kernel.org).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."