CVE-2024-57948
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
31/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mac802154: check local interfaces before deleting sdata list<br />
<br />
syzkaller reported a corrupted list in ieee802154_if_remove. [1]<br />
<br />
Remove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4<br />
hardware device from the system.<br />
<br />
CPU0 CPU1<br />
==== ====<br />
genl_family_rcv_msg_doit ieee802154_unregister_hw<br />
ieee802154_del_iface ieee802154_remove_interfaces<br />
rdev_del_virtual_intf_deprecated list_del(&sdata->list)<br />
ieee802154_if_remove<br />
list_del_rcu<br />
<br />
The net device has been unregistered, since the rcu grace period,<br />
unregistration must be run before ieee802154_if_remove.<br />
<br />
To avoid this issue, add a check for local->interfaces before deleting<br />
sdata list.<br />
<br />
[1]<br />
kernel BUG at lib/list_debug.c:58!<br />
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI<br />
CPU: 0 UID: 0 PID: 6277 Comm: syz-executor157 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024<br />
RIP: 0010:__list_del_entry_valid_or_report+0xf4/0x140 lib/list_debug.c:56<br />
Code: e8 a1 7e 00 07 90 0f 0b 48 c7 c7 e0 37 60 8c 4c 89 fe e8 8f 7e 00 07 90 0f 0b 48 c7 c7 40 38 60 8c 4c 89 fe e8 7d 7e 00 07 90 0b 48 c7 c7 a0 38 60 8c 4c 89 fe e8 6b 7e 00 07 90 0f 0b 48 c7<br />
RSP: 0018:ffffc9000490f3d0 EFLAGS: 00010246<br />
RAX: 000000000000004e RBX: dead000000000122 RCX: d211eee56bb28d00<br />
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000<br />
RBP: ffff88805b278dd8 R08: ffffffff8174a12c R09: 1ffffffff2852f0d<br />
R10: dffffc0000000000 R11: fffffbfff2852f0e R12: dffffc0000000000<br />
R13: dffffc0000000000 R14: dead000000000100 R15: ffff88805b278cc0<br />
FS: 0000555572f94380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 000056262e4a3000 CR3: 0000000078496000 CR4: 00000000003526f0<br />
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br />
Call Trace:<br />
<br />
__list_del_entry_valid include/linux/list.h:124 [inline]<br />
__list_del_entry include/linux/list.h:215 [inline]<br />
list_del_rcu include/linux/rculist.h:157 [inline]<br />
ieee802154_if_remove+0x86/0x1e0 net/mac802154/iface.c:687<br />
rdev_del_virtual_intf_deprecated net/ieee802154/rdev-ops.h:24 [inline]<br />
ieee802154_del_iface+0x2c0/0x5c0 net/ieee802154/nl-phy.c:323<br />
genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]<br />
genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]<br />
genl_rcv_msg+0xb14/0xec0 net/netlink/genetlink.c:1210<br />
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2551<br />
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]<br />
netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357<br />
netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901<br />
sock_sendmsg_nosec net/socket.c:729 [inline]<br />
__sock_sendmsg+0x221/0x270 net/socket.c:744<br />
____sys_sendmsg+0x52a/0x7e0 net/socket.c:2607<br />
___sys_sendmsg net/socket.c:2661 [inline]<br />
__sys_sendmsg+0x292/0x380 net/socket.c:2690<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.290 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.234 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.177 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.127 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.74 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d11dc30edfc4acef0acef130bb5ca596317190a
- https://git.kernel.org/stable/c/2e41e98c4e79edae338f2662dbdf74ac2245d183
- https://git.kernel.org/stable/c/41e4ca8acba39f1cecff2dfdf14ace4ee52c4272
- https://git.kernel.org/stable/c/80aee0bc0dbe253b6692d33e64455dc742fc52f1
- https://git.kernel.org/stable/c/98ea165a2ac240345c48b57c0a3d08bbcad02929
- https://git.kernel.org/stable/c/b856d2c1384bc5a7456262afd21aa439ee5cdf6e
- https://git.kernel.org/stable/c/eb09fbeb48709fe66c0d708aed81e910a577a30a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



