CVE-2024-35857 Affecting kernel-cross-headers package, versions <0:5.14.0-427.28.1.el9_4
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-KERNELCROSSHEADERS-8328686
- published 4 Nov 2024
- disclosed 31 Jul 2024
Introduced: 31 Jul 2024
CVE-2024-35857 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
kernel-cross-headers
to version 0:5.14.0-427.28.1.el9_4 or higher.
This issue was patched in ALSA-2024:4928
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-cross-headers
package and not the kernel-cross-headers
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
icmp: prevent possible NULL dereferences from icmp_build_probe()
First problem is a double call to __in_dev_get_rcu(), because the second one could return NULL.
if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list)
Second problem is a read from dev->ip6_ptr with no NULL check:
if (!list_empty(&rcu_dereference(dev->ip6_ptr)->addr_list))
Use the correct RCU API to fix these.
v2: add missing include <net/addrconf.h>
References
- https://errata.almalinux.org/9/ALSA-2024-4928.html
- https://access.redhat.com/security/cve/CVE-2024-35857
- https://access.redhat.com/errata/RHSA-2024:4928
- https://git.kernel.org/stable/c/23b7ee4a8d559bf38eac7ce5bb2f6ebf76f9c401
- https://git.kernel.org/stable/c/3e2979bf080c40da4f7c93aff8575ab8bc62b767
- https://git.kernel.org/stable/c/599c9ad5e1d43f5c12d869f5fd406ba5d8c55270
- https://git.kernel.org/stable/c/c58e88d49097bd12dfcfef4f075b43f5d5830941
- https://git.kernel.org/stable/c/d68dc711d84fdcf698e5d45308c3ddeede586350