CVE-2024-56650
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: x_tables: fix LED ID check in led_tg_check()<br />
<br />
Syzbot has reported the following BUG detected by KASAN:<br />
<br />
BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70<br />
Read of size 1 at addr ffff8881022da0c8 by task repro/5879<br />
...<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x241/0x360<br />
? __pfx_dump_stack_lvl+0x10/0x10<br />
? __pfx__printk+0x10/0x10<br />
? _printk+0xd5/0x120<br />
? __virt_addr_valid+0x183/0x530<br />
? __virt_addr_valid+0x183/0x530<br />
print_report+0x169/0x550<br />
? __virt_addr_valid+0x183/0x530<br />
? __virt_addr_valid+0x183/0x530<br />
? __virt_addr_valid+0x45f/0x530<br />
? __phys_addr+0xba/0x170<br />
? strlen+0x58/0x70<br />
kasan_report+0x143/0x180<br />
? strlen+0x58/0x70<br />
strlen+0x58/0x70<br />
kstrdup+0x20/0x80<br />
led_tg_check+0x18b/0x3c0<br />
xt_check_target+0x3bb/0xa40<br />
? __pfx_xt_check_target+0x10/0x10<br />
? stack_depot_save_flags+0x6e4/0x830<br />
? nft_target_init+0x174/0xc30<br />
nft_target_init+0x82d/0xc30<br />
? __pfx_nft_target_init+0x10/0x10<br />
? nf_tables_newrule+0x1609/0x2980<br />
? nf_tables_newrule+0x1609/0x2980<br />
? rcu_is_watching+0x15/0xb0<br />
? nf_tables_newrule+0x1609/0x2980<br />
? nf_tables_newrule+0x1609/0x2980<br />
? __kmalloc_noprof+0x21a/0x400<br />
nf_tables_newrule+0x1860/0x2980<br />
? __pfx_nf_tables_newrule+0x10/0x10<br />
? __nla_parse+0x40/0x60<br />
nfnetlink_rcv+0x14e5/0x2ab0<br />
? __pfx_validate_chain+0x10/0x10<br />
? __pfx_nfnetlink_rcv+0x10/0x10<br />
? __lock_acquire+0x1384/0x2050<br />
? netlink_deliver_tap+0x2e/0x1b0<br />
? __pfx_lock_release+0x10/0x10<br />
? netlink_deliver_tap+0x2e/0x1b0<br />
netlink_unicast+0x7f8/0x990<br />
? __pfx_netlink_unicast+0x10/0x10<br />
? __virt_addr_valid+0x183/0x530<br />
? __check_object_size+0x48e/0x900<br />
netlink_sendmsg+0x8e4/0xcb0<br />
? __pfx_netlink_sendmsg+0x10/0x10<br />
? aa_sock_msg_perm+0x91/0x160<br />
? __pfx_netlink_sendmsg+0x10/0x10<br />
__sock_sendmsg+0x223/0x270<br />
____sys_sendmsg+0x52a/0x7e0<br />
? __pfx_____sys_sendmsg+0x10/0x10<br />
__sys_sendmsg+0x292/0x380<br />
? __pfx___sys_sendmsg+0x10/0x10<br />
? lockdep_hardirqs_on_prepare+0x43d/0x780<br />
? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10<br />
? exc_page_fault+0x590/0x8c0<br />
? do_syscall_64+0xb6/0x230<br />
do_syscall_64+0xf3/0x230<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
...<br />
<br />
<br />
Since an invalid (without &#39;\0&#39; byte at all) byte sequence may be passed<br />
from userspace, add an extra check to ensure that such a sequence is<br />
rejected as possible ID and so never passed to &#39;kstrdup()&#39; and further.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.30 (including) | 5.4.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/04317f4eb2aad312ad85c1a17ad81fe75f1f9bc7
- https://git.kernel.org/stable/c/147a42bb02de8735cb08476be6d0917987d022c2
- https://git.kernel.org/stable/c/36a9d94dac28beef6b8abba46ba8874320d3e800
- https://git.kernel.org/stable/c/a9bcc0b70d9baf3ff005874489a0dc9d023b54c3
- https://git.kernel.org/stable/c/ab9916321c95f5280b72b4c5055e269f98627efe
- https://git.kernel.org/stable/c/ad28612ebae1fcc1104bd432e99e99d87f6bfe09
- https://git.kernel.org/stable/c/c40c96d98e536fc1daaa125c2332b988615e30a4
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



