We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-26731

bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()



Description

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() syzbot reported the following NULL pointer dereference issue [1]: BUG: kernel NULL pointer dereference, address: 0000000000000000 [...] RIP: 0010:0x0 [...] Call Trace: <TASK> sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 If sk_psock_verdict_data_ready() and sk_psock_stop_verdict() are called concurrently, psock->saved_data_ready can be NULL, causing the above issue. This patch fixes this issue by calling the appropriate data ready function using the sk_psock_data_ready() helper and protecting it from concurrency with sk->sk_callback_lock.

Reserved 2024-02-19 | Published 2024-04-03 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

dd628fc697ee59b76bd3877c4bd13f07ccc3776f before 4588b13abcbd561ec67f5b3c1cb2eff690990a54
affected

6df7f764cd3cf5a03a4a47b23be47e57e41fcd85 before 9b099ed46dcaf1403c531ff02c3d7400fa37fa26
affected

6df7f764cd3cf5a03a4a47b23be47e57e41fcd85 before d61608a4e394f23e0dca099df9eb8e555453d949
affected

6df7f764cd3cf5a03a4a47b23be47e57e41fcd85 before 4cd12c6065dfcdeba10f49949bffcf383b3952d8
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

6.1.80
unaffected

6.6.19
unaffected

6.7.7
unaffected

6.8
unaffected

References

git.kernel.org/...c/4588b13abcbd561ec67f5b3c1cb2eff690990a54

git.kernel.org/...c/9b099ed46dcaf1403c531ff02c3d7400fa37fa26

git.kernel.org/...c/d61608a4e394f23e0dca099df9eb8e555453d949

git.kernel.org/...c/4cd12c6065dfcdeba10f49949bffcf383b3952d8

cve.org (CVE-2024-26731)

nvd.nist.gov (CVE-2024-26731)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26731

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.