In the Linux kernel, the following vulnerability has been resolved:
netns: Make getnetns() handle zero refcount net
Syzkaller hit a warning: refcountt: addition on 0; use-after-free. WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcountwarnsaturate+0xdf/0x1d0 Modules linked in: CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:refcountwarnsaturate+0xdf/0x1d0 Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1 RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001 RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139 R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4 R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040 FS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? showregs+0xa3/0xc0 ? _warn+0xa5/0x1c0 ? refcountwarnsaturate+0xdf/0x1d0 ? reportbug+0x1fc/0x2d0 ? refcountwarnsaturate+0xdf/0x1d0 ? handlebug+0xa1/0x110 ? excinvalidop+0x3c/0xb0 ? asmexcinvalidop+0x1f/0x30 ? _warnprintk+0xcc/0x140 ? _warnprintk+0xd5/0x140 ? refcountwarnsaturate+0xdf/0x1d0 getnetns+0xa4/0xc0 ? _pfxgetnetns+0x10/0x10 openrelatedns+0x5a/0x130 _tunchrioctl+0x1616/0x2370 ? _sanitizercovtraceswitch+0x58/0xa0 ? _sanitizercovtraceconstcmp2+0x1c/0x30 ? _pfxtunchrioctl+0x10/0x10 tunchrioctl+0x2f/0x40 _x64sysioctl+0x11b/0x160 x64syscall+0x1211/0x20d0 dosyscall64+0x9e/0x1d0 entrySYSCALL64afterhwframe+0x77/0x7f RIP: 0033:0x7f5b28f165d7 Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8 RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIGRAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7 RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0 R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730 R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000 </TASK> Kernel panic - not syncing: kernel: paniconwarn set ...
This is trigger as below: ns0 ns1 tunsetiff() //dev is tun0 tun->dev = dev //ip link set tun0 netns ns1 putnet() //ref is 0 _tunchrioctl() //TUNGETDEVNETNS net = devnet(tun->dev); openrelatedns(&net->ns, getnetns); //ns1 getnetns() getnet() //addition on 0
Use maybegetnet() in getnetns in case net's ref is zero to fix this
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-0de82f69",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3af28df0d883e8c89a29ac31bc65f9023485743b",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-134ab1a3",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3af28df0d883e8c89a29ac31bc65f9023485743b",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-26fff106",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb7f811f638a14590ff98f53c6dd1fb54627d940",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-28fa3111",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef0394ca25953ea0eddcc82feae1f750451f1876",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-30abc3b2",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b82028a1f5ee3a8e04090776b10c534144ae77b",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-558e87c0",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b82028a1f5ee3a8e04090776b10c534144ae77b",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-5dde0417",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef0394ca25953ea0eddcc82feae1f750451f1876",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-65a6caaf",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff960f9d3edbe08a736b5a224d91a305ccc946b0",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-74189ab9",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b631bffcb2c09551888f3c723f4365c91fe05ef",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"function_hash": "131342580365222097642956350823542108518",
"length": 114.0
},
"id": "CVE-2024-40958-7c118275",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c",
"function": "get_net_ns"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-86c38e8e",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff960f9d3edbe08a736b5a224d91a305ccc946b0",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-98541bbf",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b631bffcb2c09551888f3c723f4365c91fe05ef",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-a8c1537d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb7f811f638a14590ff98f53c6dd1fb54627d940",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"289513054597544952824225947301560664153",
"121212663060306200641683203729141564791",
"285060070345441313481140519527583543144",
"215613263983214730972106706231334572183",
"311137391021401857790938888036965780792",
"202684700277074127409681942909603818931"
]
},
"id": "CVE-2024-40958-d593a975",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
"signature_version": "v1",
"target": {
"file": "net/core/net_namespace.c"
},
"deprecated": false
}
]