CVE-2024-42106
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
inet_diag: Initialize pad field in struct inet_diag_req_v2<br />
<br />
KMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw<br />
sockets uses the pad field in struct inet_diag_req_v2 for the<br />
underlying protocol. This field corresponds to the sdiag_raw_protocol<br />
field in struct inet_diag_req_raw.<br />
<br />
inet_diag_get_exact_compat() converts inet_diag_req to<br />
inet_diag_req_v2, but leaves the pad field uninitialized. So the issue<br />
occurs when raw_lookup() accesses the sdiag_raw_protocol field.<br />
<br />
Fix this by initializing the pad field in<br />
inet_diag_get_exact_compat(). Also, do the same fix in<br />
inet_diag_dump_compat() to avoid the similar issue in the future.<br />
<br />
[1]<br />
BUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]<br />
BUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71<br />
raw_lookup net/ipv4/raw_diag.c:49 [inline]<br />
raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71<br />
raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99<br />
inet_diag_cmd_exact+0x7d9/0x980<br />
inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]<br />
inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426<br />
sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282<br />
netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564<br />
sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]<br />
netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361<br />
netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905<br />
sock_sendmsg_nosec net/socket.c:730 [inline]<br />
__sock_sendmsg+0x332/0x3d0 net/socket.c:745<br />
____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585<br />
___sys_sendmsg+0x271/0x3b0 net/socket.c:2639<br />
__sys_sendmsg net/socket.c:2668 [inline]<br />
__do_sys_sendmsg net/socket.c:2677 [inline]<br />
__se_sys_sendmsg net/socket.c:2675 [inline]<br />
__x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675<br />
x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
Uninit was stored to memory at:<br />
raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71<br />
raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99<br />
inet_diag_cmd_exact+0x7d9/0x980<br />
inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]<br />
inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426<br />
sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282<br />
netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564<br />
sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]<br />
netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361<br />
netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905<br />
sock_sendmsg_nosec net/socket.c:730 [inline]<br />
__sock_sendmsg+0x332/0x3d0 net/socket.c:745<br />
____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585<br />
___sys_sendmsg+0x271/0x3b0 net/socket.c:2639<br />
__sys_sendmsg net/socket.c:2668 [inline]<br />
__do_sys_sendmsg net/socket.c:2677 [inline]<br />
__se_sys_sendmsg net/socket.c:2675 [inline]<br />
__x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675<br />
x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
Local variable req.i created at:<br />
inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]<br />
inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426<br />
sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282<br />
<br />
CPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.19.318 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.280 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.222 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.98 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0184bf0a349f4cf9e663abbe862ff280e8e4dfa2
- https://git.kernel.org/stable/c/61cf1c739f08190a4cbf047b9fbb192a94d87e3f
- https://git.kernel.org/stable/c/7094a5fd20ab66028f1da7f06e0f2692d70346f9
- https://git.kernel.org/stable/c/76965648fe6858db7c5f3c700fef7aa5f124ca1c
- https://git.kernel.org/stable/c/7ef519c8efde152e0d632337f2994f6921e0b7e4
- https://git.kernel.org/stable/c/8366720519ea8d322a20780debdfd23d9fc0904a
- https://git.kernel.org/stable/c/d6f487e0704de2f2d15f8dd5d7d723210f2b2fdb
- https://git.kernel.org/stable/c/f9b2010e8af49fac9d9562146fb81744d8a9b051
- https://git.kernel.org/stable/c/0184bf0a349f4cf9e663abbe862ff280e8e4dfa2
- https://git.kernel.org/stable/c/61cf1c739f08190a4cbf047b9fbb192a94d87e3f
- https://git.kernel.org/stable/c/7094a5fd20ab66028f1da7f06e0f2692d70346f9
- https://git.kernel.org/stable/c/76965648fe6858db7c5f3c700fef7aa5f124ca1c
- https://git.kernel.org/stable/c/7ef519c8efde152e0d632337f2994f6921e0b7e4
- https://git.kernel.org/stable/c/8366720519ea8d322a20780debdfd23d9fc0904a
- https://git.kernel.org/stable/c/d6f487e0704de2f2d15f8dd5d7d723210f2b2fdb
- https://git.kernel.org/stable/c/f9b2010e8af49fac9d9562146fb81744d8a9b051
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



