0b c3 cc cc cc cc 48 c7 c7 50 8f
b7 82 c6 05 7a 13 ea 01 01 e8 RSP: 0018:ffffc90006b43b60 EFLAGS:
00010282 RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX:
0000000000000027 RDX: ffff88807be218c8 RSI: 0000000000000001 RDI:
ffff88807be218c0 RBP: 0000000000069d70 R08: 0000000000000000 R09:
ffffc90006b439f0 R10: ffffc90006b439e8 R11: 0000000000000003 R12:
ffff8880029ede84 R13: 0000000000004e20 R14: ffffffff84356dc0 R15:
ffff888009bb3ef0 FS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000)
knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 CR2: 0000000020ccb000 CR3: 000000004628c005 CR4:
0000000000f70ef0 PKRU: 55555554 Call Trace:
![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-36904 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson
Nascimento reported a use-after-free splat in tcp_twsk_unique() with
nice analysis. Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic
operation for timewait hashdance"), inet_twsk_hashdance() sets TIME-
WAIT socket's sk_refcnt after putting it into ehash and releasing the
bucket lock. Thus, there is a small race window where other threads
could try to reuse the port during connect() and call sock_hold() in
tcp_twsk_unique() for the TIME-WAIT socket with zero refcnt. If that
happens, the refcnt taken by tcp_twsk_unique() is overwritten and
sock_put() will cause underflow, triggering a real use-after-free
somewhere else. To avoid the use-after-free, we need to use
refcount_inc_not_zero() in tcp_twsk_unique() and give up on reusing
the port if it returns false. [0]: refcount_t: addition on 0; use-
after-free. WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25
refcount_warn_saturate+0xe5/0x110 CPU: 0 PID: 1039313 Comm: trigger
Not tainted 6.8.6-200.fc39.x86_64 #1 Hardware name: VMware, Inc.
VMware20,1/440BX Desktop Reference Platform, BIOS
VMW201.00V.21805430.B64.2305221830 05/22/2023 RIP:
0010:refcount_warn_saturate+0xe5/0x110 Code: 42 8e ff 0f 0b c3 cc cc
cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6
05 96 13 ea 01 01 e8 7b 42 8e ff <0f> 0b c3 cc cc cc cc 48 c7 c7 50 8f
b7 82 c6 05 7a 13 ea 01 01 e8 RSP: 0018:ffffc90006b43b60 EFLAGS:
00010282 RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX:
0000000000000027 RDX: ffff88807be218c8 RSI: 0000000000000001 RDI:
ffff88807be218c0 RBP: 0000000000069d70 R08: 0000000000000000 R09:
ffffc90006b439f0 R10: ffffc90006b439e8 R11: 0000000000000003 R12:
ffff8880029ede84 R13: 0000000000004e20 R14: ffffffff84356dc0 R15:
ffff888009bb3ef0 FS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000)
knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 CR2: 0000000020ccb000 CR3: 000000004628c005 CR4:
0000000000f70ef0 PKRU: 55555554 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-36904 https://git.kernel.org/stable/c/13ed7cdf079686ccd3618335205700c03f6fb446 https://git.kernel.org/stable/c/13ed7cdf079686ccd3618335205700c03f6fb446 https://git.kernel.org/stable/c/1796ca9c6f5bd50554214053af5f47d112818ee3 https://git.kernel.org/stable/c/1796ca9c6f5bd50554214053af5f47d112818ee3 https://git.kernel.org/stable/c/1d9cf07810c30ef7948879567d10fd1f01121d34 https://git.kernel.org/stable/c/1d9cf07810c30ef7948879567d10fd1f01121d34 https://git.kernel.org/stable/c/27b0284d8be182a81feb65581ab6a724dfd596e8 https://git.kernel.org/stable/c/27b0284d8be182a81feb65581ab6a724dfd596e8 https://git.kernel.org/stable/c/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc https://git.kernel.org/stable/c/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc https://git.kernel.org/stable/c/6e48faad92be13166184d21506e4e54c79c13adc https://git.kernel.org/stable/c/6e48faad92be13166184d21506e4e54c79c13adc https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9 https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9 https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e |