CVE-2024-50035
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ppp: fix ppp_async_encode() illegal access<br />
<br />
syzbot reported an issue in ppp_async_encode() [1]<br />
<br />
In this case, pppoe_sendmsg() is called with a zero size.<br />
Then ppp_async_encode() is called with an empty skb.<br />
<br />
BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]<br />
BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675<br />
ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]<br />
ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675<br />
ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634<br />
ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]<br />
ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304<br />
pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379<br />
sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113<br />
__release_sock+0x1da/0x330 net/core/sock.c:3072<br />
release_sock+0x6b/0x250 net/core/sock.c:3626<br />
pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903<br />
sock_sendmsg_nosec net/socket.c:729 [inline]<br />
__sock_sendmsg+0x30f/0x380 net/socket.c:744<br />
____sys_sendmsg+0x903/0xb60 net/socket.c:2602<br />
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656<br />
__sys_sendmmsg+0x3c1/0x960 net/socket.c:2742<br />
__do_sys_sendmmsg net/socket.c:2771 [inline]<br />
__se_sys_sendmmsg net/socket.c:2768 [inline]<br />
__x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768<br />
x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
Uninit was created at:<br />
slab_post_alloc_hook mm/slub.c:4092 [inline]<br />
slab_alloc_node mm/slub.c:4135 [inline]<br />
kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187<br />
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587<br />
__alloc_skb+0x363/0x7b0 net/core/skbuff.c:678<br />
alloc_skb include/linux/skbuff.h:1322 [inline]<br />
sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732<br />
pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867<br />
sock_sendmsg_nosec net/socket.c:729 [inline]<br />
__sock_sendmsg+0x30f/0x380 net/socket.c:744<br />
____sys_sendmsg+0x903/0xb60 net/socket.c:2602<br />
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656<br />
__sys_sendmmsg+0x3c1/0x960 net/socket.c:2742<br />
__do_sys_sendmmsg net/socket.c:2771 [inline]<br />
__se_sys_sendmmsg net/socket.c:2768 [inline]<br />
__x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768<br />
x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
CPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.57 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/30d91a478d58cbae3dbaa8224d17d0d839f0d71b
- https://git.kernel.org/stable/c/40dddd4b8bd08a69471efd96107a4e1c73fabefc
- https://git.kernel.org/stable/c/4151ec65abd755133ebec687218fadd2d2631167
- https://git.kernel.org/stable/c/8dfe93901b410ae41264087427f3b9f389388f83
- https://git.kernel.org/stable/c/8fe992ff3df493d1949922ca234419f3ede08dff
- https://git.kernel.org/stable/c/c007a14797240607038bd3464501109f408940e2
- https://git.kernel.org/stable/c/ce249a4c68d0ce27a8c5d853338d502e2711a314
- https://git.kernel.org/stable/c/fadf8fdb3110d3138e05c3765f645535434f8d76
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



