ghsa-qxf9-65gj-mxj8
Vulnerability from github
Published
2025-01-15 15:31
Modified
2025-01-21 18:31
Details

In the Linux kernel, the following vulnerability has been resolved:

net: fix memory leak in tcp_conn_request()

If inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will return without free the dst memory, which allocated in af_ops->route_req.

Here is the kmemleak stack:

unreferenced object 0xffff8881198631c0 (size 240): comm "softirq", pid 0, jiffies 4299266571 (age 1802.392s) hex dump (first 32 bytes): 00 10 9b 03 81 88 ff ff 80 98 da bc ff ff ff ff ................ 81 55 18 bb ff ff ff ff 00 00 00 00 00 00 00 00 .U.............. backtrace: [] kmem_cache_alloc+0x60c/0xa80 [] dst_alloc+0x55/0x250 [] rt_dst_alloc+0x46/0x1d0 [] __mkroute_output+0x29a/0xa50 [] ip_route_output_key_hash+0x10b/0x240 [] ip_route_output_flow+0x1d/0x90 [] inet_csk_route_req+0x2c5/0x500 [] tcp_conn_request+0x691/0x12c0 [] tcp_rcv_state_process+0x3c8/0x11b0 [] tcp_v4_do_rcv+0x156/0x3b0 [] tcp_v4_rcv+0x1cf8/0x1d80 [] ip_protocol_deliver_rcu+0xf6/0x360 [] ip_local_deliver_finish+0xe6/0x1e0 [] ip_local_deliver+0xee/0x360 [] ip_rcv+0xad/0x2f0 [] __netif_receive_skb_one_core+0x123/0x140

Call dst_release() to free the dst memory when inet_csk_reqsk_queue_hash_add() return false in tcp_conn_request().

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2024-57841"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-401"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-01-15T13:15:12Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in tcp_conn_request()\n\nIf inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will\nreturn without free the dst memory, which allocated in af_ops-\u003eroute_req.\n\nHere is the kmemleak stack:\n\nunreferenced object 0xffff8881198631c0 (size 240):\n  comm \"softirq\", pid 0, jiffies 4299266571 (age 1802.392s)\n  hex dump (first 32 bytes):\n    00 10 9b 03 81 88 ff ff 80 98 da bc ff ff ff ff  ................\n    81 55 18 bb ff ff ff ff 00 00 00 00 00 00 00 00  .U..............\n  backtrace:\n    [\u003cffffffffb93e8d4c\u003e] kmem_cache_alloc+0x60c/0xa80\n    [\u003cffffffffba11b4c5\u003e] dst_alloc+0x55/0x250\n    [\u003cffffffffba227bf6\u003e] rt_dst_alloc+0x46/0x1d0\n    [\u003cffffffffba23050a\u003e] __mkroute_output+0x29a/0xa50\n    [\u003cffffffffba23456b\u003e] ip_route_output_key_hash+0x10b/0x240\n    [\u003cffffffffba2346bd\u003e] ip_route_output_flow+0x1d/0x90\n    [\u003cffffffffba254855\u003e] inet_csk_route_req+0x2c5/0x500\n    [\u003cffffffffba26b331\u003e] tcp_conn_request+0x691/0x12c0\n    [\u003cffffffffba27bd08\u003e] tcp_rcv_state_process+0x3c8/0x11b0\n    [\u003cffffffffba2965c6\u003e] tcp_v4_do_rcv+0x156/0x3b0\n    [\u003cffffffffba299c98\u003e] tcp_v4_rcv+0x1cf8/0x1d80\n    [\u003cffffffffba239656\u003e] ip_protocol_deliver_rcu+0xf6/0x360\n    [\u003cffffffffba2399a6\u003e] ip_local_deliver_finish+0xe6/0x1e0\n    [\u003cffffffffba239b8e\u003e] ip_local_deliver+0xee/0x360\n    [\u003cffffffffba239ead\u003e] ip_rcv+0xad/0x2f0\n    [\u003cffffffffba110943\u003e] __netif_receive_skb_one_core+0x123/0x140\n\nCall dst_release() to free the dst memory when\ninet_csk_reqsk_queue_hash_add() return false in tcp_conn_request().",
  "id": "GHSA-qxf9-65gj-mxj8",
  "modified": "2025-01-21T18:31:05Z",
  "published": "2025-01-15T15:31:24Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57841"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/2af69905180b3fea12f9c1db374b153a06977021"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/4f4aa4aa28142d53f8b06585c478476cfe325cfc"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9d38959677291552d1b0ed2689a540af279b5bf8"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b0b190218c78d8aeecfba36ea3a90063b3ede52d"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/de3f999bf8aee16e9da1c1224191abdc69e97c9d"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…