CVE-2024-36938

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36938
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36938.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-36938
Downstream
Related
Published
2024-05-30T15:29:26Z
Modified
2025-10-17T07:08:41.451750Z
Summary
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf, skmsg: Fix NULL pointer dereference in skpsockskbingressenqueue

Fix NULL pointer data-races in skpsockskbingressenqueue() which syzbot reported [1].

[1] BUG: KCSAN: data-race in skpsockdrop / skpsockskbingressenqueue

write to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1: skpsockstopverdict net/core/skmsg.c:1257 [inline] skpsockdrop+0x13e/0x1f0 net/core/skmsg.c:843 skpsockput include/linux/skmsg.h:459 [inline] sockmapclose+0x1a7/0x260 net/core/sockmap.c:1648 unixrelease+0x4b/0x80 net/unix/afunix.c:1048 _sockrelease net/socket.c:659 [inline] sockclose+0x68/0x150 net/socket.c:1421 _fput+0x2c1/0x660 fs/filetable.c:422 _fputsync+0x44/0x60 fs/filetable.c:507 _dosysclose fs/open.c:1556 [inline] _sesysclose+0x101/0x1b0 fs/open.c:1541 _x64sysclose+0x1f/0x30 fs/open.c:1541 dosyscall64+0xd3/0x1d0 entrySYSCALL64after_hwframe+0x6d/0x75

read to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0: skpsockdataready include/linux/skmsg.h:464 [inline] skpsockskbingressenqueue+0x32d/0x390 net/core/skmsg.c:555 skpsockskbingressself+0x185/0x1e0 net/core/skmsg.c:606 skpsockverdictapply net/core/skmsg.c:1008 [inline] skpsockverdictrecv+0x3e4/0x4a0 net/core/skmsg.c:1202 unixreadskb net/unix/afunix.c:2546 [inline] unixstreamreadskb+0x9e/0xf0 net/unix/afunix.c:2682 skpsockverdictdataready+0x77/0x220 net/core/skmsg.c:1223 unixstreamsendmsg+0x527/0x860 net/unix/afunix.c:2339 socksendmsgnosec net/socket.c:730 [inline] socksendmsg+0x140/0x180 net/socket.c:745 syssendmsg+0x312/0x410 net/socket.c:2584 _syssendmsg net/socket.c:2638 [inline] _syssendmsg+0x1e9/0x280 net/socket.c:2667 _dosyssendmsg net/socket.c:2676 [inline] _sesyssendmsg net/socket.c:2674 [inline] _x64syssendmsg+0x46/0x50 net/socket.c:2674 dosyscall64+0xd3/0x1d0 entrySYSCALL64after_hwframe+0x6d/0x75

value changed: 0xffffffff83d7feb0 -> 0x0000000000000000

Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G W 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024

Prior to this, commit 4cd12c6065df ("bpf, sockmap: Fix NULL pointer dereference in skpsockverdictdataready()") fixed one NULL pointer similarly due to no protection of saveddataready. Here is another different caller causing the same issue because of the same reason. So we should protect it with skcallbacklock read lock because the writer side in the skpsockdrop() uses "writelockbh(&sk->skcallbacklock);".

To avoid errors that could happen in future, I move those two pairs of lock into the skpsockdata_ready(), which is suggested by John Fastabend.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
c0809c128dad4c3413818384eb06a341633db973
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
5965bc7535fb87510b724e5465ccc1a1cf00916d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
39dc9e1442385d6e9be0b6491ee488dddd55ae27
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
b397a0ab8582c533ec0c6b732392f141fc364f87
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
772d5729b5ff0df0d37b32db600ce635b2172f80
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604326b41a6fb9b4a78b6179335decee0365cd8c
Fixed
6648e613226e18897231ab5e42ffc29e63fa3365

Affected versions

v4.*

v4.19
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.100
v5.10.101
v5.10.102
v5.10.103
v5.10.104
v5.10.105
v5.10.106
v5.10.107
v5.10.108
v5.10.109
v5.10.11
v5.10.110
v5.10.111
v5.10.112
v5.10.113
v5.10.114
v5.10.115
v5.10.116
v5.10.117
v5.10.118
v5.10.119
v5.10.12
v5.10.120
v5.10.121
v5.10.122
v5.10.123
v5.10.124
v5.10.125
v5.10.126
v5.10.127
v5.10.128
v5.10.129
v5.10.13
v5.10.130
v5.10.131
v5.10.132
v5.10.133
v5.10.134
v5.10.135
v5.10.136
v5.10.137
v5.10.138
v5.10.139
v5.10.14
v5.10.140
v5.10.141
v5.10.142
v5.10.143
v5.10.144
v5.10.145
v5.10.146
v5.10.147
v5.10.148
v5.10.149
v5.10.15
v5.10.150
v5.10.151
v5.10.152
v5.10.153
v5.10.154
v5.10.155
v5.10.156
v5.10.157
v5.10.158
v5.10.159
v5.10.16
v5.10.160
v5.10.161
v5.10.162
v5.10.163
v5.10.164
v5.10.165
v5.10.166
v5.10.167
v5.10.168
v5.10.169
v5.10.17
v5.10.170
v5.10.171
v5.10.172
v5.10.173
v5.10.174
v5.10.175
v5.10.176
v5.10.177
v5.10.178
v5.10.179
v5.10.18
v5.10.180
v5.10.181
v5.10.182
v5.10.183
v5.10.184
v5.10.185
v5.10.186
v5.10.187
v5.10.188
v5.10.189
v5.10.19
v5.10.190
v5.10.191
v5.10.192
v5.10.193
v5.10.194
v5.10.195
v5.10.196
v5.10.197
v5.10.198
v5.10.199
v5.10.2
v5.10.20
v5.10.200
v5.10.201
v5.10.202
v5.10.203
v5.10.204
v5.10.205
v5.10.206
v5.10.207
v5.10.208
v5.10.209
v5.10.21
v5.10.210
v5.10.211
v5.10.212
v5.10.213
v5.10.214
v5.10.215
v5.10.216
v5.10.217
v5.10.218
v5.10.219
v5.10.22
v5.10.220
v5.10.221
v5.10.222
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.100
v5.15.101
v5.15.102
v5.15.103
v5.15.104
v5.15.105
v5.15.106
v5.15.107
v5.15.108
v5.15.109
v5.15.11
v5.15.110
v5.15.111
v5.15.112
v5.15.113
v5.15.114
v5.15.115
v5.15.116
v5.15.117
v5.15.118
v5.15.119
v5.15.12
v5.15.120
v5.15.121
v5.15.122
v5.15.123
v5.15.124
v5.15.125
v5.15.126
v5.15.127
v5.15.128
v5.15.129
v5.15.13
v5.15.130
v5.15.131
v5.15.132
v5.15.133
v5.15.134
v5.15.135
v5.15.136
v5.15.137
v5.15.138
v5.15.139
v5.15.14
v5.15.140
v5.15.141
v5.15.142
v5.15.143
v5.15.144
v5.15.145
v5.15.146
v5.15.147
v5.15.148
v5.15.149
v5.15.15
v5.15.150
v5.15.151
v5.15.152
v5.15.153
v5.15.154
v5.15.155
v5.15.156
v5.15.157
v5.15.158
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.15.87
v5.15.88
v5.15.89
v5.15.9
v5.15.90
v5.15.91
v5.15.92
v5.15.93
v5.15.94
v5.15.95
v5.15.96
v5.15.97
v5.15.98
v5.15.99
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.8.5
v6.8.6
v6.8.7
v6.8.8
v6.8.9
v6.9-rc1
v6.9-rc2

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "digest": {
            "length": 518.0,
            "function_hash": "148888688789408510343836383464614552347"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-0c1c0f18",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b397a0ab8582c533ec0c6b732392f141fc364f87",
        "target": {
            "file": "net/core/skmsg.c",
            "function": "sk_psock_verdict_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "179898563046323241584666447006119575924",
                "216194981307668409981961214945525918275",
                "274046226025652670179665515870580582212",
                "75047994901841226623447581291413442856",
                "296084974750542345833230630926772932266",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-125fdb3a",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5965bc7535fb87510b724e5465ccc1a1cf00916d",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 177.0,
            "function_hash": "78870280638535156660838007671549909042"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-2b32e851",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@772d5729b5ff0df0d37b32db600ce635b2172f80",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "73174370494463458820082499656981259453",
                "265463190318676205140400907966656943813",
                "59829596237539197260415272303541173977",
                "149819244975681634136791364857191713139",
                "7951829589057530825889499225531009883",
                "316548427144120965166473769968512747322",
                "258679143058848237555627839446440701647",
                "286035976875156266593891687967399115786"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-3170601e",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6648e613226e18897231ab5e42ffc29e63fa3365",
        "target": {
            "file": "net/core/skmsg.c"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "73174370494463458820082499656981259453",
                "265463190318676205140400907966656943813",
                "59829596237539197260415272303541173977",
                "149819244975681634136791364857191713139",
                "7951829589057530825889499225531009883",
                "316548427144120965166473769968512747322",
                "258679143058848237555627839446440701647",
                "286035976875156266593891687967399115786"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-36c7a437",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b397a0ab8582c533ec0c6b732392f141fc364f87",
        "target": {
            "file": "net/core/skmsg.c"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 518.0,
            "function_hash": "148888688789408510343836383464614552347"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-46ef6fb0",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@772d5729b5ff0df0d37b32db600ce635b2172f80",
        "target": {
            "file": "net/core/skmsg.c",
            "function": "sk_psock_verdict_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 177.0,
            "function_hash": "78870280638535156660838007671549909042"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-53ba2495",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@39dc9e1442385d6e9be0b6491ee488dddd55ae27",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 177.0,
            "function_hash": "78870280638535156660838007671549909042"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-937e18fa",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b397a0ab8582c533ec0c6b732392f141fc364f87",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 518.0,
            "function_hash": "148888688789408510343836383464614552347"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-93cc132a",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6648e613226e18897231ab5e42ffc29e63fa3365",
        "target": {
            "file": "net/core/skmsg.c",
            "function": "sk_psock_verdict_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "73174370494463458820082499656981259453",
                "265463190318676205140400907966656943813",
                "59829596237539197260415272303541173977",
                "149819244975681634136791364857191713139",
                "7951829589057530825889499225531009883",
                "316548427144120965166473769968512747322",
                "258679143058848237555627839446440701647",
                "286035976875156266593891687967399115786"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-a9753ec4",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@39dc9e1442385d6e9be0b6491ee488dddd55ae27",
        "target": {
            "file": "net/core/skmsg.c"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 177.0,
            "function_hash": "78870280638535156660838007671549909042"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-abf72eee",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6648e613226e18897231ab5e42ffc29e63fa3365",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 186.0,
            "function_hash": "45899038087272072286083759558553550592"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-b375c343",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0809c128dad4c3413818384eb06a341633db973",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "179898563046323241584666447006119575924",
                "216194981307668409981961214945525918275",
                "274046226025652670179665515870580582212",
                "75047994901841226623447581291413442856",
                "296084974750542345833230630926772932266",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-d2038ea5",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6648e613226e18897231ab5e42ffc29e63fa3365",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "120827263688993155774414370565014496343",
                "199231344161688021343236244535677278384",
                "321974459164051294437304944868937859735",
                "5773364884151334886433522519293581152",
                "214678186974540615555643316067305872182",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-d6131aee",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0809c128dad4c3413818384eb06a341633db973",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "179898563046323241584666447006119575924",
                "216194981307668409981961214945525918275",
                "274046226025652670179665515870580582212",
                "75047994901841226623447581291413442856",
                "296084974750542345833230630926772932266",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-da447384",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@39dc9e1442385d6e9be0b6491ee488dddd55ae27",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "73174370494463458820082499656981259453",
                "265463190318676205140400907966656943813",
                "59829596237539197260415272303541173977",
                "149819244975681634136791364857191713139",
                "7951829589057530825889499225531009883",
                "316548427144120965166473769968512747322",
                "258679143058848237555627839446440701647",
                "286035976875156266593891687967399115786"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-dbf61811",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@772d5729b5ff0df0d37b32db600ce635b2172f80",
        "target": {
            "file": "net/core/skmsg.c"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 453.0,
            "function_hash": "316550127774207512133582004796983587936"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-e9d853f5",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@39dc9e1442385d6e9be0b6491ee488dddd55ae27",
        "target": {
            "file": "net/core/skmsg.c",
            "function": "sk_psock_verdict_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "179898563046323241584666447006119575924",
                "216194981307668409981961214945525918275",
                "274046226025652670179665515870580582212",
                "75047994901841226623447581291413442856",
                "296084974750542345833230630926772932266",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-ebd9067c",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b397a0ab8582c533ec0c6b732392f141fc364f87",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "length": 177.0,
            "function_hash": "78870280638535156660838007671549909042"
        },
        "signature_type": "Function",
        "id": "CVE-2024-36938-f1674914",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5965bc7535fb87510b724e5465ccc1a1cf00916d",
        "target": {
            "file": "include/linux/skmsg.h",
            "function": "sk_psock_data_ready"
        },
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "177979101529885904599016741381415411765",
                "179898563046323241584666447006119575924",
                "216194981307668409981961214945525918275",
                "274046226025652670179665515870580582212",
                "75047994901841226623447581291413442856",
                "296084974750542345833230630926772932266",
                "126459302885722148330706748990426590902",
                "278787085788308657851967658462847767828"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-36938-f6333e25",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@772d5729b5ff0df0d37b32db600ce635b2172f80",
        "target": {
            "file": "include/linux/skmsg.h"
        },
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.10.223
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.159
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.91
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.31
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.10