![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26741 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished(). syzkaller reported a warning [0] in
inet_csk_destroy_sock() with no repro. WARN_ON(inet_sk(sk)->inet_num
&& !inet_csk(sk)->icsk_bind_hash); However, the syzkaller's log hinted
that connect() failed just before the warning due to FAULT_INJECTION.
[1] When connect() is called for an unbound socket, we search for an
available ephemeral port. If a bhash bucket exists for the port, we
call __inet_check_established() or __inet6_check_established() to
check if the bucket is reusable. If reusable, we add the socket into
ehash and set inet_sk(sk)->inet_num. Later, we look up the
corresponding bhash2 bucket and try to allocate it if it does not
exist. Although it rarely occurs in real use, if the allocation fails,
we must revert the changes by check_established(). Otherwise, an
unconnected socket could illegally occupy an ehash entry. Note that we
do not put tw back into ehash because sk might have already responded
to a packet for tw and it would be better to free tw earlier under
such memory presure. [0]: WARNING: CPU: 0 PID: 350830 at
net/ipv4/inet_connection_sock.c:1193 inet_csk_destroy_sock
(net/ipv4/inet_connection_sock.c:1193) Modules linked in: Hardware
name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP:
0010:inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)
Code: 41 5c 41 5d 41 5e e9 2d 4a 3d fd e8 28 4a 3d fd 48 89 ef e8 f0
cd 7d ff 5b 5d 41 5c 41 5d 41 5e e9 13 4a 3d fd e8 0e 4a 3d fd <0f> 0b
e9 61 fe ff ff e8 02 4a 3d fd 4c 89 e7 be 03 00 00 00 e8 05 RSP:
0018:ffffc9000b21fd38 EFLAGS: 00010293 RAX: 0000000000000000 RBX:
0000000000009e78 RCX: ffffffff840bae40 RDX: ffff88806e46c600 RSI:
ffffffff840bb012 RDI: ffff88811755cca8 RBP: ffff88811755c880 R08:
0000000000000003 R09: 0000000000000000 R10: 0000000000009e78 R11:
0000000000000000 R12: ffff88811755c8e0 R13: ffff88811755c892 R14:
ffff88811755c918 R15: 0000000000000000 FS: 00007f03e5243800(0000)
GS:ffff88811ae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES:
0000 CR0: 0000000080050033 CR2: 0000001b32f21000 CR3: 0000000112ffe001
CR4: 0000000000770ef0 PKRU: 55555554 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26741 https://git.kernel.org/stable/c/334a8348b2df26526f3298848ad6864285592caf https://git.kernel.org/stable/c/334a8348b2df26526f3298848ad6864285592caf https://git.kernel.org/stable/c/66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f https://git.kernel.org/stable/c/66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f https://git.kernel.org/stable/c/729bc77af438a6e67914c97f6f3d3af8f72c0131 https://git.kernel.org/stable/c/729bc77af438a6e67914c97f6f3d3af8f72c0131 https://git.kernel.org/stable/c/f8c4a6b850882bc47aaa864b720c7a2ee3102f39 https://git.kernel.org/stable/c/f8c4a6b850882bc47aaa864b720c7a2ee3102f39 |