In the Linux kernel, the following vulnerability has been resolved:
netfilter: bpf: must hold reference on net namespace
BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0
Read of size 8 at addr ffff8880106fe400 by task repro/72=
bpf_nf_link_release+0xda/0x1e0
bpf_link_free+0x139/0x2d0
bpf_link_release+0x68/0x80
__fput+0x414/0xb60
Eric says:
 It seems that bpf was able to defer the __nf_unregister_net_hook()
 after exit()/close() time.
 Perhaps a netns reference is missing, because the netns has been
 dismantled/freed already.
 bpf_nf_link_attach() does :
 link->net = net;
 But I do not see a reference being taken on net.
Add such a reference and release it after hook unreg.
Note that I was unable to get syzbot reproducer to work, so I
do not know if this resolves this splat.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    07 Nov 2024, 21:49
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Linux linux Kernel
         Linux  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*  | 
|
| References | () https://git.kernel.org/stable/c/1230fe7ad3974f7bf6c78901473e039b34d4fb1f - Patch | |
| References | () https://git.kernel.org/stable/c/d0d7939543a1b3bb93af9a18d258a774daf8f162 - Patch | |
| References | () https://git.kernel.org/stable/c/f41bd93b3e0508edc7ba820357f949071dcc0acc - Patch | 
06 Nov 2024, 18:17
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
05 Nov 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-05 18:15
Updated : 2025-03-06 17:15
NVD link : CVE-2024-50130
Mitre link : CVE-2024-50130
CVE.ORG link : CVE-2024-50130
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
