CVE-2024-26754

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
03/04/2024
Last modified:
07/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()<br /> <br /> The gtp_net_ops pernet operations structure for the subsystem must be<br /> registered before registering the generic netlink family.<br /> <br /> Syzkaller hit &amp;#39;general protection fault in gtp_genl_dump_pdp&amp;#39; bug:<br /> <br /> general protection fault, probably for non-canonical address<br /> 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI<br /> KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]<br /> CPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014<br /> RIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]<br /> Code: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86<br /> df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <br /> 3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74<br /> RSP: 0018:ffff888014107220 EFLAGS: 00010202<br /> RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000<br /> RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000<br /> RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000<br /> R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000<br /> R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000<br /> FS: 00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? show_regs+0x90/0xa0<br /> ? die_addr+0x50/0xd0<br /> ? exc_general_protection+0x148/0x220<br /> ? asm_exc_general_protection+0x22/0x30<br /> ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]<br /> ? __alloc_skb+0x1dd/0x350<br /> ? __pfx___alloc_skb+0x10/0x10<br /> genl_dumpit+0x11d/0x230<br /> netlink_dump+0x5b9/0xce0<br /> ? lockdep_hardirqs_on_prepare+0x253/0x430<br /> ? __pfx_netlink_dump+0x10/0x10<br /> ? kasan_save_track+0x10/0x40<br /> ? __kasan_kmalloc+0x9b/0xa0<br /> ? genl_start+0x675/0x970<br /> __netlink_dump_start+0x6fc/0x9f0<br /> genl_family_rcv_msg_dumpit+0x1bb/0x2d0<br /> ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10<br /> ? genl_op_from_small+0x2a/0x440<br /> ? cap_capable+0x1d0/0x240<br /> ? __pfx_genl_start+0x10/0x10<br /> ? __pfx_genl_dumpit+0x10/0x10<br /> ? __pfx_genl_done+0x10/0x10<br /> ? security_capable+0x9d/0xe0

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.7 (including) 4.19.308 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.270 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.211 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.150 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.80 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*