CVE-2024-36886
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
30/05/2024
Last modified:
22/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tipc: fix UAF in error path<br />
<br />
Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported<br />
a UAF in the tipc_buf_append() error path:<br />
<br />
BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0<br />
linux/net/core/skbuff.c:1183<br />
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034<br />
<br />
CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br />
1.16.0-debian-1.16.0-5 04/01/2014<br />
Call Trace:<br />
<br />
__dump_stack linux/lib/dump_stack.c:88<br />
dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106<br />
print_address_description linux/mm/kasan/report.c:377<br />
print_report+0xc4/0x620 linux/mm/kasan/report.c:488<br />
kasan_report+0xda/0x110 linux/mm/kasan/report.c:601<br />
kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183<br />
skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026<br />
skb_release_all linux/net/core/skbuff.c:1094<br />
__kfree_skb linux/net/core/skbuff.c:1108<br />
kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144<br />
kfree_skb linux/./include/linux/skbuff.h:1244<br />
tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186<br />
tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324<br />
tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824<br />
tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159<br />
tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390<br />
udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108<br />
udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186<br />
udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346<br />
__udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422<br />
ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205<br />
ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233<br />
NF_HOOK linux/./include/linux/netfilter.h:314<br />
NF_HOOK linux/./include/linux/netfilter.h:308<br />
ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254<br />
dst_input linux/./include/net/dst.h:461<br />
ip_rcv_finish linux/net/ipv4/ip_input.c:449<br />
NF_HOOK linux/./include/linux/netfilter.h:314<br />
NF_HOOK linux/./include/linux/netfilter.h:308<br />
ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569<br />
__netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534<br />
__netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648<br />
process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976<br />
__napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576<br />
napi_poll linux/net/core/dev.c:6645<br />
net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781<br />
__do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553<br />
do_softirq linux/kernel/softirq.c:454<br />
do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441<br />
<br />
<br />
__local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381<br />
local_bh_enable linux/./include/linux/bottom_half.h:33<br />
rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851<br />
__dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378<br />
dev_queue_xmit linux/./include/linux/netdevice.h:3169<br />
neigh_hh_output linux/./include/net/neighbour.h:526<br />
neigh_output linux/./include/net/neighbour.h:540<br />
ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235<br />
__ip_finish_output linux/net/ipv4/ip_output.c:313<br />
__ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295<br />
ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323<br />
NF_HOOK_COND linux/./include/linux/netfilter.h:303<br />
ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433<br />
dst_output linux/./include/net/dst.h:451<br />
ip_local_out linux/net/ipv4/ip_output.c:129<br />
ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492<br />
udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963<br />
udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250<br />
inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850<br />
sock_sendmsg_nosec linux/net/socket.c:730<br />
__sock_sendmsg linux/net/socket.c:745<br />
__sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191<br />
__do_sys_sendto linux/net/socket.c:2203<br />
__se_sys_sendto linux/net/socket.c:2199<br />
__x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199<br />
do_syscall_x64 linux/arch/x86/entry/common.c:52<br />
do_syscall_<br />
---truncated---
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.1 (including) | 4.19.314 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.217 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.159 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.91 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b
- https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14
- https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1
- https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684
- https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40
- https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90
- https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd
- https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682
- https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b
- https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14
- https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1
- https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684
- https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40
- https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90
- https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd
- https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682
- https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
- https://security.netapp.com/advisory/ntap-20241018-0002/



