Executive Summary

Informations
Name CVE-2024-42109 First vendor Publication 2024-07-30
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unconditionally flush pending work before notifier

syzbot reports:

KASAN: slab-uaf in nft_ctx_update include/net/netfilter/nf_tables.h:1831 KASAN: slab-uaf in nft_commit_release net/netfilter/nf_tables_api.c:9530 KASAN: slab-uaf int nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597 Read of size 2 at addr ffff88802b0051c4 by task kworker/1:1/45 [..] Workqueue: events nf_tables_trans_destroy_work Call Trace:
nft_ctx_update include/net/netfilter/nf_tables.h:1831 [inline]
nft_commit_release net/netfilter/nf_tables_api.c:9530 [inline]
nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597

Problem is that the notifier does a conditional flush, but its possible that the table-to-be-removed is still referenced by transactions being processed by the worker, so we need to flush unconditionally.

We could make the flush_work depend on whether we found a table to delete in nf-next to avoid the flush for most cases.

AFAICS this problem is only exposed in nf-next, with commit e169285f8c56 ("netfilter: nf_tables: do not store nft_ctx in transaction objects"), with this commit applied there is an unconditional fetch of table->family which is whats triggering the above splat.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/09e650c3a3a7d804430260510534ccbf71c75b2e
https://git.kernel.org/stable/c/3325628cb36b7f216c5716e7b5124d9dc81199e4
https://git.kernel.org/stable/c/4c06c13317b9a08decedcd7aaf706691e336277c
https://git.kernel.org/stable/c/55a40406aac555defe9bdd0adec9508116ce7cb1
https://git.kernel.org/stable/c/9f6958ba2e902f9820c594869bd710ba74b7c4c0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2025-01-08 03:04:05
  • Multiple Updates
2025-01-07 03:03:38
  • Multiple Updates
2024-12-25 03:02:16
  • Multiple Updates
2024-12-12 03:05:13
  • Multiple Updates
2024-11-25 09:23:19
  • Multiple Updates
2024-11-22 21:22:33
  • Multiple Updates
2024-11-21 21:22:04
  • Multiple Updates
2024-11-20 02:58:50
  • Multiple Updates
2024-11-14 02:59:09
  • Multiple Updates
2024-11-09 02:59:10
  • Multiple Updates
2024-10-26 02:56:33
  • Multiple Updates
2024-10-25 02:58:28
  • Multiple Updates
2024-10-23 02:57:41
  • Multiple Updates
2024-10-03 02:52:59
  • Multiple Updates
2024-10-02 02:51:23
  • Multiple Updates
2024-09-15 02:49:06
  • Multiple Updates
2024-09-12 02:48:38
  • Multiple Updates
2024-09-07 02:47:38
  • Multiple Updates
2024-09-06 02:46:48
  • Multiple Updates
2024-09-03 21:27:58
  • Multiple Updates
2024-08-27 17:27:53
  • Multiple Updates
2024-07-30 17:27:23
  • Multiple Updates
2024-07-30 13:27:27
  • First insertion