CVE-2024-50035

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ppp: fix ppp_async_encode() illegal access<br /> <br /> syzbot reported an issue in ppp_async_encode() [1]<br /> <br /> In this case, pppoe_sendmsg() is called with a zero size.<br /> Then ppp_async_encode() is called with an empty skb.<br /> <br /> BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]<br /> BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675<br /> ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]<br /> ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675<br /> ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634<br /> ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]<br /> ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304<br /> pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379<br /> sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113<br /> __release_sock+0x1da/0x330 net/core/sock.c:3072<br /> release_sock+0x6b/0x250 net/core/sock.c:3626<br /> pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903<br /> sock_sendmsg_nosec net/socket.c:729 [inline]<br /> __sock_sendmsg+0x30f/0x380 net/socket.c:744<br /> ____sys_sendmsg+0x903/0xb60 net/socket.c:2602<br /> ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656<br /> __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742<br /> __do_sys_sendmmsg net/socket.c:2771 [inline]<br /> __se_sys_sendmmsg net/socket.c:2768 [inline]<br /> __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768<br /> x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> <br /> Uninit was created at:<br /> slab_post_alloc_hook mm/slub.c:4092 [inline]<br /> slab_alloc_node mm/slub.c:4135 [inline]<br /> kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187<br /> kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587<br /> __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678<br /> alloc_skb include/linux/skbuff.h:1322 [inline]<br /> sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732<br /> pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867<br /> sock_sendmsg_nosec net/socket.c:729 [inline]<br /> __sock_sendmsg+0x30f/0x380 net/socket.c:744<br /> ____sys_sendmsg+0x903/0xb60 net/socket.c:2602<br /> ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656<br /> __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742<br /> __do_sys_sendmmsg net/socket.c:2771 [inline]<br /> __se_sys_sendmmsg net/socket.c:2768 [inline]<br /> __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768<br /> x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> <br /> CPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.12 (including) 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.57 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*