CVE-2024-53212

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53212
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53212.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53212
Downstream
Related
Published
2024-12-27T13:49:57Z
Modified
2025-10-10T02:17:55.964703Z
Summary
netlink: fix false positive warning in extack during dumps
Details

In the Linux kernel, the following vulnerability has been resolved:

netlink: fix false positive warning in extack during dumps

Commit under fixes extended extack reporting to dumps. It works under normal conditions, because extack errors are usually reported during ->start() or the first ->dump(), it's quite rare that the dump starts okay but fails later. If the dump does fail later, however, the input skb will already have the initiating message pulled, so checking if bad attr falls within skb->data will fail.

Switch the check to using nlh, which is always valid.

syzbot found a way to hit that scenario by filling up the receive queue. In this case we initiate a dump but don't call ->dump() until there is read space for an skb.

WARNING: CPU: 1 PID: 5845 at net/netlink/afnetlink.c:2210 netlinkacktlvfill+0x1a8/0x560 net/netlink/afnetlink.c:2209 RIP: 0010:netlinkacktlvfill+0x1a8/0x560 net/netlink/afnetlink.c:2209 Call Trace: <TASK> netlinkdumpdone+0x513/0x970 net/netlink/afnetlink.c:2250 netlinkdump+0x91f/0xe10 net/netlink/afnetlink.c:2351 netlinkrecvmsg+0x6bb/0x11d0 net/netlink/afnetlink.c:1983 sockrecvmsgnosec net/socket.c:1051 [inline] sockrecvmsg+0x22f/0x280 net/socket.c:1073 _sysrecvfrom+0x246/0x3d0 net/socket.c:2267 _dosysrecvfrom net/socket.c:2285 [inline] _sesysrecvfrom net/socket.c:2281 [inline] _x64sysrecvfrom+0xde/0x100 net/socket.c:2281 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xf3/0x230 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f RIP: 0033:0x7ff37dd17a79

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8af4f60472fce1f22db5068107b37bcc1a65eabd
Fixed
6406d0ce0414b807af5d2a4b781c3f3ee52b8a4d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8af4f60472fce1f22db5068107b37bcc1a65eabd
Fixed
28af028a71371df5fcbf807fd4444bba8d0c33cc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8af4f60472fce1f22db5068107b37bcc1a65eabd
Fixed
3bf39fa849ab8ed52abb6715922e6102d3df9f97

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.10
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.11.7
v6.11.8
v6.11.9
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.9
v6.9-rc5
v6.9-rc6
v6.9-rc7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.11.11
Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.2