CVE-2024-44989
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bonding: fix xfrm real_dev null pointer dereference<br />
<br />
We shouldn&#39;t set real_dev to NULL because packets can be in transit and<br />
xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume<br />
real_dev is set.<br />
<br />
Example trace:<br />
kernel: BUG: unable to handle page fault for address: 0000000000001030<br />
kernel: bond0: (slave eni0np1): making interface the new active one<br />
kernel: #PF: supervisor write access in kernel mode<br />
kernel: #PF: error_code(0x0002) - not-present page<br />
kernel: PGD 0 P4D 0<br />
kernel: Oops: 0002 [#1] PREEMPT SMP<br />
kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12<br />
kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014<br />
kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]<br />
kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA<br />
kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f<br />
kernel: bond0: (slave eni0np1): making interface the new active one<br />
kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246<br />
kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA<br />
kernel:<br />
kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60<br />
kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00<br />
kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014<br />
kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000<br />
kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000<br />
kernel: FS: 00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000<br />
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0<br />
kernel: bond0: (slave eni0np1): making interface the new active one<br />
kernel: Call Trace:<br />
kernel: <br />
kernel: ? __die+0x1f/0x60<br />
kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA<br />
kernel: ? page_fault_oops+0x142/0x4c0<br />
kernel: ? do_user_addr_fault+0x65/0x670<br />
kernel: ? kvm_read_and_reset_apf_flags+0x3b/0x50<br />
kernel: bond0: (slave eni0np1): making interface the new active one<br />
kernel: ? exc_page_fault+0x7b/0x180<br />
kernel: ? asm_exc_page_fault+0x22/0x30<br />
kernel: ? nsim_bpf_uninit+0x50/0x50 [netdevsim]<br />
kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA<br />
kernel: ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]<br />
kernel: bond0: (slave eni0np1): making interface the new active one<br />
kernel: bond_ipsec_offload_ok+0x7b/0x90 [bonding]<br />
kernel: xfrm_output+0x61/0x3b0<br />
kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA<br />
kernel: ip_push_pending_frames+0x56/0x80
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.225 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.166 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.107 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.48 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/21816b696c172c19d53a30d45ee005cce246ed21
- https://git.kernel.org/stable/c/2f72c6a66bcd7e0187ec085237fee5db27145294
- https://git.kernel.org/stable/c/4582d4ff413a07d4ed8a4823c652dc5207760548
- https://git.kernel.org/stable/c/7fa9243391ad2afe798ef4ea2e2851947b95754f
- https://git.kernel.org/stable/c/89fc1dca79db5c3e7a2d589ecbf8a3661c65f436
- https://git.kernel.org/stable/c/f8cde9805981c50d0c029063dc7d82821806fc44
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



