CVE-2024-49860

Access of Resource Using Incompatible Type ('Type Confusion') (CWE-843)

Published: Oct 21, 2024 / Updated: 29d ago

010
CVSS 7.1EPSS 0.04%High
CVE info copied to clipboard

Summary

In the Linux kernel, a vulnerability has been identified in the ACPI sysfs implementation. The issue lies in the validation of the return type of the _STR method. Only buffer objects are valid return values for _STR. If any other type is returned, the description_show() function will access invalid memory. This vulnerability affects Linux kernel versions from 3.7 up to, but not including, 5.10.227, 5.15.168, 6.1.113, 6.6.54, 6.10.13, and 6.11.2.

Impact

This vulnerability could lead to a system crash or potential arbitrary code execution with elevated privileges. The impact is primarily on system availability and confidentiality, as indicated by the CVSS score's "HIGH" availability and confidentiality impact. There is no direct impact on integrity. The vulnerability has a CVSS base score of 7.1, which is considered high severity. It requires local access and low privileges to exploit, with no user interaction needed.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Patches are available for this vulnerability. Multiple patch details have been released and are accessible through various git.kernel.org links. Additionally, a patch is available at https://bugzilla.redhat.com/show_bug.cgi?id=2320200. It's crucial to apply these patches as soon as possible to mitigate the vulnerability.

Mitigation

1. Apply the available patches immediately to all affected Linux kernel versions. 2. Prioritize patching based on the high CVSS base score of 7.1. 3. If immediate patching is not possible, consider limiting local access to affected systems, as the attack vector is local. 4. Ensure that only trusted users have low-level privileges on affected systems. 5. Monitor systems for any unusual behavior or crashes that might indicate exploitation attempts. 6. Consider updating to the latest patched kernel versions: 5.10.227, 5.15.168, 6.1.113, 6.6.54, 6.10.13, or 6.11.2 and above, depending on your current version. 7. Implement the principle of least privilege to minimize the potential impact of successful exploitation.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-49860

Oct 21, 2024 at 1:15 PM
First Article

Feedly found the first article mentioning CVE-2024-49860. See article

Oct 21, 2024 at 1:27 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 21, 2024 at 1:27 PM
Vendor Advisory

RedHat CVE advisory released a security advisory (CVE-2024-49860).

Oct 21, 2024 at 2:45 PM
CVSS

A CVSS base score of 5.5 has been assigned.

Oct 21, 2024 at 2:45 PM / redhat-cve-advisories
EPSS

EPSS Score was set to: 0.04% (Percentile: 11.1%)

Oct 22, 2024 at 10:47 AM
CVSS

A CVSS base score of 7.1 has been assigned.

Oct 23, 2024 at 4:45 PM / nvd
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210933)

Nov 14, 2024 at 10:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210938)

Nov 14, 2024 at 12:15 PM
Static CVE Timeline Graph

Affected Systems

Linux/linux_kernel
+null more

Patches

bugzilla.redhat.com
+null more

Vendor Advisory

CVE-2024-49860
Red Hat Enterprise Linux 8 - kernel - Affected Red Hat Enterprise Linux 8 - kernel-rt - Affected

References

SUSE: 2024:4038-1 important: the Linux Kernel Security Advisory Updates
* bsc#1218562 * bsc#1223016 * bsc#1223384 * bsc#1223824 * bsc#1224526
Security: Mehrere Probleme in Linux (SUSE)
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security # Security update for the Linux Kernel
SUSE: 2024:3985-1 important: the Linux Kernel Security Advisory Updates
* KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).

News

SUSE: 2024:4038-1 important: the Linux Kernel Security Advisory Updates
* bsc#1218562 * bsc#1223016 * bsc#1223384 * bsc#1223824 * bsc#1224526
Security: Mehrere Probleme in Linux (SUSE)
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security # Security update for the Linux Kernel
SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:3985-1)
Nessus Plugin ID 210938 with Critical Severity Synopsis The remote SUSE host is missing one or more security updates. Description The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3985-1 advisory. The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556). - CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
openSUSE 15 Security Update : kernel (SUSE-SU-2024:3983-1)
Nessus Plugin ID 210933 with Critical Severity Synopsis The remote openSUSE host is missing one or more security updates. Description The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3983-1 advisory. The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556). - CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
suse_linux SUSE-SU-2024:3986-1: SUSE openSUSE 15 : Security update for the Linux Kernel (Important) (SUSE-SU-2024:3986-1)
Development Last Updated: 11/14/2024 CVEs: CVE-2024-49929 , CVE-2024-47681 , CVE-2024-46871 , CVE-2024-47697 , CVE-2024-47718 , CVE-2024-50044 , CVE-2024-46857 , CVE-2024-41031 , CVE-2024-46817 , CVE-2024-47739 , CVE-2024-49920 , CVE-2024-46816 , CVE-2024-46819 , CVE-2024-47688 , CVE-2024-46843 , CVE-2024-49996 , CVE-2024-47667 , CVE-2024-47702 , CVE-2024-50041 , CVE-2024-47737 , CVE-2024-46849 , CVE-2024-47665 , CVE-2024-49972 , CVE-2024-46766 , CVE-2024-47719 , CVE-2024-49947 , CVE-2024-49993 , CVE-2024-49860 , CVE-2024-47712 , CVE-2024-45025 , CVE-2024-47751 , CVE-2024-49955 , CVE-2024-50040 , CVE-2024-47698 , CVE-2024-46870 , CVE-2024-49867 , CVE-2024-49962 , CVE-2024-49855 , CVE-2024-49985 , CVE-2024-26761 , CVE-2024-49931 , CVE-2024-47684 , CVE-2024-46836 , CVE-2024-50025 , CVE-2024-50055 , CVE-2024-46826 , CVE-2024-47752 , CVE-2024-26767 , CVE-2023-52919 , CVE-2024-46809 , CVE-2024-50022 , CVE-2024-47749 , CVE-2024-50059 , CVE-2024-47757 , CVE-2024-47706 , CVE-2024-49936 , CVE-2024-49958 , CVE-2024-49946 , CVE-2024-50045 , CVE-2024-49900 , CVE-2024-49935 , CVE-2024-47670 , CVE-2024-41047 , CVE-2024-49892 , CVE-2024-46797 , CVE-2024-46813 , CVE-2024-47720 , CVE-2024-50075 , CVE-2024-50021 , CVE-2024-50076 , CVE-2024-49953 , CVE-2024-49967 , CVE-2024-35980 , CVE-2024-50073 , CVE-2024-50058 , CVE-2024-49863 , CVE-2024-50033 , CVE-2024-49891 , CVE-2024-50001 , CVE-2024-50035 , CVE-2024-47723 , CVE-2024-47727 , CVE-2024-49886 , CVE-2024-49981 , CVE-2024-27043 , CVE-2024-38577 , CVE-2024-44932 , CVE-2024-46831 , CVE-2024-46754 , CVE-2024-46807 , CVE-2024-47728 , CVE-2024-49917 , CVE-2024-47738 , CVE-2024-47686 , CVE-2024-49963 , CVE-2024-47710 , CVE-2024-49861 , CVE-2024-42145 , CVE-2024-46861 , CVE-2024-49902 , CVE-2024-47741 , CVE-2024-50061 , CVE-2024-46802 , CVE-2024-46835 , CVE-2024-27026 , CVE-2024-46821 , CVE-2024-49878 , CVE-2024-47663 , CVE-2024-49874 , CVE-2024-49864 , CVE-2024-47731 , CVE-2024-49930 , CVE-2024-47669 , CVE-2024-47709 , CVE-2024-47713 , CVE-2024-46864 , CVE-2024-49906 , CVE-2024-50046 , CVE-2024-49879 , CVE-2024-49877 , CVE-2024-47750 , CVE-2024-49928 , CVE-2024-50002 , CVE-2024-47743 , CVE-2024-49965 , CVE-2024-46810 , CVE-2024-47744 , CVE-2024-49908 , CVE-2024-50013 , CVE-2024-46814 , CVE-2024-47658 , CVE-2024-46853 , CVE-2024-46804 , CVE-2024-47695 , CVE-2024-47707 , CVE-2024-50007 , CVE-2024-50017 , CVE-2023-52766 , CVE-2024-49896 , CVE-2024-49858 , CVE-2024-49938 , CVE-2024-49982 , CVE-2024-47745 , CVE-2024-47696 , CVE-2024-49991 , CVE-2024-46830 , CVE-2024-50062 , CVE-2024-46721 , CVE-2024-46848 , CVE-2024-46678 , CVE-2024-46770 , CVE-2024-49888 , CVE-2024-46806 , CVE-2024-46818 , CVE-2024-26758 , CVE-2024-45016 , CVE-2024-41082 , CVE-2024-49907 , CVE-2024-49966 , CVE-2024-47672 , CVE-2024-49949 , CVE-2024-49898 , CVE-2024-50060 , CVE-2024-50028 , CVE-2024-49961 , CVE-2024-46841 , CVE-2024-49918 , CVE-2024-50024 , CVE-2023-52881 , CVE-2024-26943 , CVE-2024-41016 , CVE-2024-46803 , CVE-2024-49875 , CVE-2024-46840 , CVE-2024-47664 , CVE-2024-49903 , CVE-2024-46846 , CVE-2024-49960 , CVE-2024-47705 , CVE-2024-50042 , CVE-2024-47693 , CVE-2024-50069 , CVE-2024-49973 , CVE-2024-46852 , CVE-2024-50008 , CVE-2024-50000 , CVE-2024-47662 , CVE-2024-49862 , CVE-2024-46842 , CVE-2024-47674 , CVE-2024-50027 , CVE-2024-49871 , CVE-2024-49850 , CVE-2024-50047 , CVE-2024-47699 , CVE-2024-49939 , CVE-2024-47668 , CVE-2024-47675 , CVE-2023-52918 , CVE-2024-47732 , CVE-2024-46812 , CVE-2024-50023 , CVE-2024-47754 , CVE-2024-49995 , CVE-2024-47748 , CVE-2024-49957 , CVE-2024-46834 , CVE-2024-38599 , CVE-2024-50019 , CVE-2024-50077 , CVE-2024-47742 , CVE-2024-47692 , CVE-2024-49919 , CVE-2024-46805 , CVE-2024-47660 , CVE-2024-46825 , CVE-2024-47671 , CVE-2024-49937 , CVE-2024-50049 , CVE-2024-50063 , CVE-2024-47753 , CVE-2024-46827 , CVE-2024-49851 , CVE-2024-46851 , CVE-2024-47730 , CVE-2024-49974 , CVE-2024-46860 , CVE-2024-50020 , CVE-2023-52800 , CVE-2024-49914 , CVE-2024-46811 , CVE-2024-49954 , CVE-2024-38576 , CVE-2024-50074 , CVE-2024-47685 , CVE-2024-50031 , CVE-2024-50078 , CVE-2024-46775 , CVE-2024-46828 , CVE-2024-47735 , CVE-2024-36244 , CVE-2024-47714 , CVE-2024-47687 , CVE-2024-47704 , CVE-2024-49853 , CVE-2024-49986 , CVE-2024-47756 , CVE-2023-6270 , CVE-2024-44964 , CVE-2024-44958 , CVE-2024-49969 , CVE-2024-46859 , CVE-2024-47682 , CVE-2024-46855 , CVE-2024-47661 , CVE-2024-46777 , CVE-2024-46854 , CVE-2024-49950 , CVE-2024-49882 , CVE-2024-50064 , CVE-2024-50048 , CVE-2024-47673 , CVE-2024-49870 , CVE-2024-49890 , CVE-2024-47715 , CVE-2023-52917 , CVE-2024-47747 , CVE-2024-46815
See 11 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI