Lucene search

K
zdiSam Page (sam4k)ZDI-24-821
HistoryJun 20, 2024 - 12:00 a.m.

Linux Kernel TIPC Message Reassembly Use-After-Free Remote Code Execution Vulnerability

2024-06-2000:00:00
Sam Page (sam4k)
www.zerodayinitiative.com
2
linux kernel
tipc
message reassembly
use-after-free
remote code execution
vulnerability
authentication
exploit
tipc bearer
fragmented messages
object validation
kernel code

7.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with TIPC bearer enabled are vulnerable. The specific flaw exists within the processing of fragmented TIPC messages. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

7.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%