CVE-2024-42272

Source
https://cve.org/CVERecord?id=CVE-2024-42272
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42272.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42272
Downstream
Related
Published
2024-08-17T08:54:26.755Z
Modified
2026-03-20T12:38:45.518939Z
Summary
sched: act_ct: take care of padding in struct zones_ht_key
Details

In the Linux kernel, the following vulnerability has been resolved:

sched: actct: take care of padding in struct zonesht_key

Blamed commit increased lookup key size from 2 bytes to 16 bytes, because zoneshtkey got a struct net pointer.

Make sure rhashtable_lookup() is not using the padding bytes which are not initialized.

BUG: KMSAN: uninit-value in rhtptrrcu include/linux/rhashtable.h:376 [inline] BUG: KMSAN: uninit-value in __rhashtablelookup include/linux/rhashtable.h:607 [inline] BUG: KMSAN: uninit-value in rhashtablelookup include/linux/rhashtable.h:646 [inline] BUG: KMSAN: uninit-value in rhashtable_lookupfast include/linux/rhashtable.h:672 [inline] BUG: KMSAN: uninit-value in tcfctflowtableget+0x611/0x2260 net/sched/actct.c:329 rhtptrrcu include/linux/rhashtable.h:376 [inline] __rhashtablelookup include/linux/rhashtable.h:607 [inline] rhashtablelookup include/linux/rhashtable.h:646 [inline] rhashtablelookupfast include/linux/rhashtable.h:672 [inline] tcfctflowtableget+0x611/0x2260 net/sched/actct.c:329 tcfctinit+0xa67/0x2890 net/sched/actct.c:1408 tcfactioninit1+0x6cc/0xb30 net/sched/actapi.c:1425 tcfactioninit+0x458/0xf00 net/sched/actapi.c:1488 tcfactionadd net/sched/actapi.c:2061 [inline] tcctlaction+0x4be/0x19d0 net/sched/actapi.c:2118 rtnetlinkrcvmsg+0x12fc/0x1410 net/core/rtnetlink.c:6647 netlinkrcvskb+0x375/0x650 net/netlink/afnetlink.c:2550 rtnetlinkrcv+0x34/0x40 net/core/rtnetlink.c:6665 netlinkunicastkernel net/netlink/afnetlink.c:1331 [inline] netlinkunicast+0xf52/0x1260 net/netlink/afnetlink.c:1357 netlinksendmsg+0x10da/0x11e0 net/netlink/afnetlink.c:1901 socksendmsgnosec net/socket.c:730 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:745 ____sys_sendmsg+0x877/0xb60 net/socket.c:2597 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2651 __sys_sendmsg net/socket.c:2680 [inline] __dosyssendmsg net/socket.c:2689 [inline] __sesyssendmsg net/socket.c:2687 [inline] _x64syssendmsg+0x307/0x4a0 net/socket.c:2687 x64syscall+0x2dd6/0x3c10 arch/x86/include/generated/asm/syscalls64.h:47 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xcd/0x1e0 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f

Local variable key created at: tcfctflowtableget+0x4a/0x2260 net/sched/actct.c:324 tcfctinit+0xa67/0x2890 net/sched/actct.c:1408

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42272.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
03f625505e27f709390a86c9b78d3707f4c23df8
Fixed
7c03ab555eb1ba26c77fd7c25bdf44a0ac23edee
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
aa1f81fe3a059bc984b230b5352ab89d06aa3c7b
Fixed
3ddefcb8f75e312535e2e7d5fef9932019ba60f2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f82f75f843445daa81e8b2a76774b1348033ce6
Fixed
d06daf0ad645d9225a3ff6958dd82e1f3988fa64
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9126fd82e9edc7b4796f756e4b258d34f17e5e4a
Fixed
d7cc186d0973afce0e1237c37f7512c01981fb79
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
88c67aeb14070bab61d3dd8be96c8b42ebcaf53a
Fixed
3a5b68869dbe14f1157c6a24ac71923db060eeab
Fixed
2191a54f63225b548fd8346be3611c3219a24738
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
b4382b854975ae96fbfcc83a1d79b5c063c1aaa8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42272.json"