CVE-2024-36883

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
30/05/2024
Last modified:
22/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: fix out-of-bounds access in ops_init<br /> <br /> net_alloc_generic is called by net_alloc, which is called without any<br /> locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It<br /> is read twice, first to allocate an array, then to set s.len, which is<br /> later used to limit the bounds of the array access.<br /> <br /> It is possible that the array is allocated and another thread is<br /> registering a new pernet ops, increments max_gen_ptrs, which is then used<br /> to set s.len with a larger than allocated length for the variable array.<br /> <br /> Fix it by reading max_gen_ptrs only once in net_alloc_generic. If<br /> max_gen_ptrs is later incremented, it will be caught in net_assign_generic.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.0.19 (including) 3.1 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.2.3 (including) 3.3 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.3.1 (including) 4.19.314 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.276 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.217 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.159 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.31 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.10 (excluding)
cpe:2.3:o:linux:linux_kernel:3.3:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*