{"id":"CVE-2024-46800","summary":"sch/netem: fix use after free in netem_dequeue","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent's\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF","modified":"2026-04-03T13:14:38.936636Z","published":"2024-09-18T07:12:54.330Z","related":["MGASA-2024-0316","MGASA-2024-0318","SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4367-1","SUSE-SU-2024:4376-1","SUSE-SU-2025:0035-1","SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46800.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/14f91ab8d391f249b845916820a56f42cf747241"},{"type":"WEB","url":"https://git.kernel.org/stable/c/295ad5afd9efc5f67b86c64fce28fb94e26dc4c9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/32008ab989ddcff1a485fa2b4906234c25dc5cd6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b3a2a9c6349e25a025d2330f479bc33a6ccb54a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/98c75d76187944296068d685dfd8a1e9fd8c4fdc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db2c235682913a63054e741fe4e19645fdf2d68e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dde33a9d0b80aae0c69594d1f462515d7ff1cb3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0bddb4de043399f16d1969dad5ee5b984a64e7b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46800.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46800"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"50612537e9ab29693122fab20fc1eed235054ffe"},{"fixed":"f0bddb4de043399f16d1969dad5ee5b984a64e7b"},{"fixed":"295ad5afd9efc5f67b86c64fce28fb94e26dc4c9"},{"fixed":"98c75d76187944296068d685dfd8a1e9fd8c4fdc"},{"fixed":"14f91ab8d391f249b845916820a56f42cf747241"},{"fixed":"db2c235682913a63054e741fe4e19645fdf2d68e"},{"fixed":"dde33a9d0b80aae0c69594d1f462515d7ff1cb3d"},{"fixed":"32008ab989ddcff1a485fa2b4906234c25dc5cd6"},{"fixed":"3b3a2a9c6349e25a025d2330f479bc33a6ccb54a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46800.json"}}],"schema_version":"1.7.5"}