CVE-2024-40958

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
12/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netns: Make get_net_ns() handle zero refcount net<br /> <br /> Syzkaller hit a warning:<br /> refcount_t: addition on 0; use-after-free.<br /> WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0<br /> Modules linked in:<br /> CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014<br /> RIP: 0010:refcount_warn_saturate+0xdf/0x1d0<br /> Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1<br /> RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286<br /> RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac<br /> RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001<br /> RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139<br /> R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4<br /> R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040<br /> FS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> ? show_regs+0xa3/0xc0<br /> ? __warn+0xa5/0x1c0<br /> ? refcount_warn_saturate+0xdf/0x1d0<br /> ? report_bug+0x1fc/0x2d0<br /> ? refcount_warn_saturate+0xdf/0x1d0<br /> ? handle_bug+0xa1/0x110<br /> ? exc_invalid_op+0x3c/0xb0<br /> ? asm_exc_invalid_op+0x1f/0x30<br /> ? __warn_printk+0xcc/0x140<br /> ? __warn_printk+0xd5/0x140<br /> ? refcount_warn_saturate+0xdf/0x1d0<br /> get_net_ns+0xa4/0xc0<br /> ? __pfx_get_net_ns+0x10/0x10<br /> open_related_ns+0x5a/0x130<br /> __tun_chr_ioctl+0x1616/0x2370<br /> ? __sanitizer_cov_trace_switch+0x58/0xa0<br /> ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30<br /> ? __pfx_tun_chr_ioctl+0x10/0x10<br /> tun_chr_ioctl+0x2f/0x40<br /> __x64_sys_ioctl+0x11b/0x160<br /> x64_sys_call+0x1211/0x20d0<br /> do_syscall_64+0x9e/0x1d0<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> RIP: 0033:0x7f5b28f165d7<br /> Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8<br /> RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010<br /> RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7<br /> RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003<br /> RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0<br /> R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730<br /> R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000<br /> <br /> Kernel panic - not syncing: kernel: panic_on_warn set ...<br /> <br /> This is trigger as below:<br /> ns0 ns1<br /> tun_set_iff() //dev is tun0<br /> tun-&gt;dev = dev<br /> //ip link set tun0 netns ns1<br /> put_net() //ref is 0<br /> __tun_chr_ioctl() //TUNGETDEVNETNS<br /> net = dev_net(tun-&gt;dev);<br /> open_related_ns(&amp;net-&gt;ns, get_net_ns); //ns1<br /> get_net_ns()<br /> get_net() //addition on 0<br /> <br /> Use maybe_get_net() in get_net_ns in case net&amp;#39;s ref is zero to fix this

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.2 (including) 5.4.279 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.221 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.162 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.96 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.36 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*