![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26780 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix task hung while purging oob_skb in GC. syzbot reported a
task hung; at the same time, GC was looping infinitely in
list_for_each_entry_safe() for OOB skb. [0] syzbot demonstrated that
the list_for_each_entry_safe() was not actually safe in this case. A
single skb could have references for multiple sockets. If we free such
a skb in the list_for_each_entry_safe(), the current and next sockets
could be unlinked in a single iteration. unix_notinflight() uses
list_del_init() to unlink the socket, so the prefetched next socket
forms a loop itself and list_for_each_entry_safe() never stops. Here,
we must use while() and make sure we always fetch the first socket.
[0]: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1
PID: 5065 Comm: syz-executor236 Not tainted
6.8.0-rc3-syzkaller-00136-g1f719a2f3fa6 #0 Hardware name: Google
Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]
RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline] RIP:
0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207 Code: cc cc
cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90
90 90 90 90 f3 0f 1e fa 65 48 8b 14 25 40 c2 03 00 <65> 8b 05 b4 7c 78
7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 RSP:
0018:ffffc900033efa58 EFLAGS: 00000283 RAX: ffff88807b077800 RBX:
ffff88807b077800 RCX: 1ffffffff27b1189 RDX: ffff88802a5a3b80 RSI:
ffffffff8968488d RDI: ffff88807b077f70 RBP: ffffc900033efbb0 R08:
0000000000000001 R09: fffffbfff27a900c R10: ffffffff93d48067 R11:
ffffffff8ae000eb R12: ffff88807b077800 R13: dffffc0000000000 R14:
ffff88807b077e40 R15: 0000000000000001 FS: 0000000000000000(0000)
GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES:
0000 CR0: 0000000080050033 CR2: 0000564f4fc1e3a8 CR3: 000000000d57a000
CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26780 https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839 https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839 https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669 https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669 https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3 https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3 https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91 https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91 |