CVE-2024-36886

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
30/05/2024
Last modified:
22/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tipc: fix UAF in error path<br /> <br /> Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported<br /> a UAF in the tipc_buf_append() error path:<br /> <br /> BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0<br /> linux/net/core/skbuff.c:1183<br /> Read of size 8 at addr ffff88804d2a7c80 by task poc/8034<br /> <br /> CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br /> 1.16.0-debian-1.16.0-5 04/01/2014<br /> Call Trace:<br /> <br /> __dump_stack linux/lib/dump_stack.c:88<br /> dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106<br /> print_address_description linux/mm/kasan/report.c:377<br /> print_report+0xc4/0x620 linux/mm/kasan/report.c:488<br /> kasan_report+0xda/0x110 linux/mm/kasan/report.c:601<br /> kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183<br /> skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026<br /> skb_release_all linux/net/core/skbuff.c:1094<br /> __kfree_skb linux/net/core/skbuff.c:1108<br /> kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144<br /> kfree_skb linux/./include/linux/skbuff.h:1244<br /> tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186<br /> tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324<br /> tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824<br /> tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159<br /> tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390<br /> udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108<br /> udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186<br /> udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346<br /> __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422<br /> ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205<br /> ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233<br /> NF_HOOK linux/./include/linux/netfilter.h:314<br /> NF_HOOK linux/./include/linux/netfilter.h:308<br /> ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254<br /> dst_input linux/./include/net/dst.h:461<br /> ip_rcv_finish linux/net/ipv4/ip_input.c:449<br /> NF_HOOK linux/./include/linux/netfilter.h:314<br /> NF_HOOK linux/./include/linux/netfilter.h:308<br /> ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569<br /> __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534<br /> __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648<br /> process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976<br /> __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576<br /> napi_poll linux/net/core/dev.c:6645<br /> net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781<br /> __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553<br /> do_softirq linux/kernel/softirq.c:454<br /> do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441<br /> <br /> <br /> __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381<br /> local_bh_enable linux/./include/linux/bottom_half.h:33<br /> rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851<br /> __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378<br /> dev_queue_xmit linux/./include/linux/netdevice.h:3169<br /> neigh_hh_output linux/./include/net/neighbour.h:526<br /> neigh_output linux/./include/net/neighbour.h:540<br /> ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235<br /> __ip_finish_output linux/net/ipv4/ip_output.c:313<br /> __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295<br /> ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323<br /> NF_HOOK_COND linux/./include/linux/netfilter.h:303<br /> ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433<br /> dst_output linux/./include/net/dst.h:451<br /> ip_local_out linux/net/ipv4/ip_output.c:129<br /> ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492<br /> udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963<br /> udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250<br /> inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850<br /> sock_sendmsg_nosec linux/net/socket.c:730<br /> __sock_sendmsg linux/net/socket.c:745<br /> __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191<br /> __do_sys_sendto linux/net/socket.c:2203<br /> __se_sys_sendto linux/net/socket.c:2199<br /> __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199<br /> do_syscall_x64 linux/arch/x86/entry/common.c:52<br /> do_syscall_<br /> ---truncated---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.1 (including) 4.19.314 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.276 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.217 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.159 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.31 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.10 (excluding)
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*