"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\")wasnotabletofixtherootcause.\n\nWeneedtodeferthefib6_info_release()callsafter\nip6_route_mpath_notify(),inthecleanupphase.\n\n[1]\nBUG:KASAN:slab-use-after-freeinrt6_fill_node+0x1460/0x1ac0\nReadofsize4ataddrffff88809a07fc64bytasksyz-executor.2/23037\n\nCPU:0PID:23037Comm:syz-executor.2Nottainted6.8.0-rc4-syzkaller-01035-gea7f3cfaa588#0\nHardwarename:GoogleGoogleComputeEngine/GoogleComputeEngine,BIOSGoogle01/25/2024\nCallTrace:\n<TASK>\n__dump_stacklib/dump_stack.c:88[inline]\ndump_stack_lvl+0x1e7/0x2e0lib/dump_stack.c:106\nprint_address_descriptionmm/kasan/report.c:377[inline]\nprint_report+0x167/0x540mm/kasan/report.c:488\nkasan_report+0x142/0x180mm/kasan/report.c:601\nrt6_fill_node+0x1460/0x1ac0\ninet6_rt_notify+0x13b/0x290net/ipv6/route.c:6184\nip6_route_mpath_notifynet/ipv6/route.c:5198[inline]\nip6_route_multipath_addnet/ipv6/route.c:5404[inline]\ninet6_rtm_newroute+0x1d0f/0x2300net/ipv6/route.c:5517\nrtnetlink_rcv_msg+0x885/0x1040net/core/rtnetlink.c:6597\nnetlink_rcv_skb+0x1e3/0x430net/netlink/af_netlink.c:2543\nnetlink_unicast_kernelnet/netlink/af_netlink.c:1341[inline]\nnetlink_unicast+0x7ea/0x980net/netlink/af_netlink.c:1367\nnetlink_sendmsg+0xa3b/0xd70net/netlink/af_netlink.c:1908\nsock_sendmsg_nosecnet/socket.c:730[inline]\n__sock_sendmsg+0x221/0x270net/socket.c:745\n____sys_sendmsg+0x525/0x7d0net/socket.c:2584\n___sys_sendmsgnet/socket.c:2638[inline]\n__sys_sendmsg+0x2b0/0x3a0net/socket.c:2667\ndo_syscall_64+0xf9/0x240\nentry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP:0033:0x7f73dd87dda9\nCode:2800000075054883c428c3e8e1200000904889f84889f74889d64889ca4d89c24d89c84c8b4c24080f05<48>3d01f0ffff7301c348c7c1b0fffffff7d864890148\nRSP:002b:00007f73de6550c8EFLAGS:00000246ORIG_RAX:000000000000002e\nRAX:ffffffffffffffdaRBX:00007f73dd9ac050RCX:00007f73dd87dda9\nRDX:0000000000000000RSI:0000000020000140RDI:0000000000000005\nRBP:00007f73dd8ca47aR08:0000000000000000R09:0000000000000000\nR10:0000000000000000R11:0000000000000246R12:0000000000000000\nR13:000000000000006eR14:00007f73dd9ac050R15:00007ffdbdeb7858\n</TASK>\n\nAllocatedbytask23037:\nkasan_save_stackmm/kasan/common.c:47[inline]\nkasan_save_track+0x3f/0x80mm/kasan/common.c:68\npoison_kmalloc_redzonemm/kasan/common.c:372[inline]\n__kasan_kmalloc+0x98/0xb0mm/kasan/common.c:389\nkasan_kmallocinclude/linux/kasan.h:211[inline]\n__do_kmalloc_nodemm/slub.c:3981[inline]\n__kmalloc+0x22e/0x490mm/slub.c:3994\nkmallocinclude/linux/slab.h:594[inline]\nkzallocinclude/linux/slab.h:711[inline]\nfib6_info_alloc+0x2e/0xf0net/ipv6/ip6_fib.c:155\nip6_route_info_create+0x445/0x12b0net/ipv6/route.c:3758\nip6_route_multipath_addnet/ipv6/route.c:5298[inline]\ninet6_rtm_newroute+0x744/0x2300net/ipv6/route.c:5517\nrtnetlink_rcv_msg+0x885/0x1040net/core/rtnetlink.c:6597\nnetlink_rcv_skb+0x1e3/0x430net/netlink/af_netlink.c:2543\nnetlink_unicast_kernelnet/netlink/af_netlink.c:1341[inline]\nnetlink_unicast+0x7ea/0x980net/netlink/af_netlink.c:1367\nnetlink_sendmsg+0xa3b/0xd70net/netlink/af_netlink.c:1908\nsock_sendmsg_nosecnet/socket.c:730[inline]\n__sock_sendmsg+0x221/0x270net/socket.c:745\n____sys_sendmsg+0x525/0x7d0net/socket.c:2584\n___sys_sendmsgnet/socket.c:2638[inline]\n__sys_sendmsg+0x2b0/0x3a0net/socket.c:2667\ndo_syscall_64+0xf9/0x240\nentry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreedbytask16:\nkasan_save_stackmm/kasan/common.c:47[inline]\nkasan_save_track+0x3f/0x80mm/kasan/common.c:68\nkasan_save_free_info+0x4e/0x60mm/kasan/generic.c:640\npoison_slab_object+0xa6/0xe0m\n---truncat
"value":"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net/ipv6: evita posible UAF en ip6_route_mpath_notify() syzbot encontr\u00f3 otro use-after-free en ip6_route_mpath_notify() [1] Commit f7225172f25a (\"net/ipv6: previene el use-after-free in ip6_route_mpath_notify\")nopudosolucionarlacausara\u00edz.Necesitamosdiferirlasllamadasafib6_info_release()despu\u00e9sdeip6_route_mpath_notify(),enlafasedelimpieza.[1]ERROR:KASAN:slab-use-after-freeenrt6_fill_node+0x1460/0x1ac0Lecturadetama\u00f1o4enladirecci\u00f3nffff88809a07fc64mediantelatareasyz-executor.2/23037CPU:0PID:23037Comm:syz-executor.2Nottainted6.8.0-rc4-syzkaller-01035-gea7f3cfaa588#0Nombredelhardware:GoogleGoogleComputeEngine/GoogleComputeEngine,BIOSGoogle25/01/2024Seguimientodellamadas:__dump_stacklib/dump_stack.c:88[enl\u00ednea]dump_stack_lvl+0x1e7/0x2e0lib/dump_stack.c:106print_address_descriptionmm/kasan/report.c:377[enl\u00ednea]print_report+0x167/0x540mm/kasan/report.c:488kasan_report+0x142/0x180mm/kasan/report.c:601rt6_fill_node+0x1460/0x1ac0inet6_rt_notify+0x13b/0x290net/ipv6/route.c:6184ip6_route_mpath_notifynet/ipv6/route.c:5198[enl\u00ednea]ip6_route_multipath_addnet/ipv6/route.c:5404et6_rtm_nuevaruta+0x1d0f/0x2300net/ipv6/route.c:5517rtnetlink_rcv_msg+0x885/0x1040net/core/rtnetlink.c:6597netlink_rcv_skb+0x1e3/0x430net/netlink/af_netlink.c:2543netlink_unicast_kernelnet/netlink/af_netlink.c:1341[enl\u00ednea]netlink_unicast+0x7ea/0x980net/netlink/af_netlink.c:1367netlink_sendmsg+0xa3b/0xd70net/netlink/af_netlink.c:1908sock_sendmsg_nosecnet/socket.c:730[enl\u00ednea]__sock_sendmsg+0x221/0x270net/socket.c:745____sys_sendmsg+0x525/0x7d0net/socket.c:2584___sys_sendmsgnet/socket.c:2638[enl\u00ednea]__sys_sendmsg+0x2b0/0x3a0net/socket.c:2667do_syscall_64+0xf9/0x240entrada_SYSCALL_64_after_hwframe+0x6f/0x77RIP:0033:0x7f73dd87dda9C\u00f3digo:2800000075054883c428c3e8e1200000904889f84889f74889d64889ca4d89c24d89c84c8b24080f05<48>3d01f0ffff7301c348c7c1b0fffffff7d864890148RSP:002b:00007f73de6550c8EFLAGS:00000246ORIG_RAX:000000000000002eRAX:deRBX:00007f73dd9ac050RCX:00007f73dd87dda9RDX:0000000000000000RSI:0000000020000140RDI:0000000000000005RBP:00007f73dd8ca47aR08:0000000000000000R09:0000000000000000R10:00000000000000000R11:0000000000000246R12:0000000000000000R13:000000000000006eR14:00007f73dd9ac050R15:00007ffdbdeb7858Asignadoportarea23037:kasan_save_stackmm/kasan/common.c:47[enl\u00ednea]kasan_save_track+0x3f/0x80mm/kasan/common.c:68veneno_kmalloc_redzonemm/kasan/common.c:372[enl\u00ednea]__kasan_kmalloc+0x98/0xb0mm/kasan/common.c:389kasan_kmallocinclude/linux/kasan.h:211[enl\u00ednea]__do_kmalloc_nodemm/slub.c:3981[enl\u00ednea]__kmalloc+0x22e/0x490mm/slub.c:3994kmallocinclude/linux/slab.h:594[enl\u00ednea]kzallocinclude/linux/slab.h:711[enl\u00ednea]fib6_info_alloc+0x2e/0xf0net/ipv6/ip6_fib.c:155ip6_route_info_create+0x445/0x12b0net/ipv6/route.c:3758ip6_route_multipath_addnet/ipv6/route.c:5298[inet6_rtm_newroute+0x744/0x2300neto/ipv6/route.c:5517rtnetlink_rcv_msg+0x885/0x1040net/core/rtnetlink.c:6597netlink_rcv_skb+0x1e3/0x430net/netlink/af_netlink.c:2543netlink_unicast_kernelnet/netlink/af_netlink.c:1341[enl\u00ednea]netlink_unicast+0x7ea/0x980net/netlink/af_netlink.c:1367netlink_sendmsg+0xa3b/0xd70net/netlink/af_netlink.c:1908sock_sendmsg_nosecnet/socket.c:730[enl\u00ednea]__sock_sendmsg+0x221/0x270net/socket.c:745____sys_sendmsg+0x525/0x7d0net/socket.c:2584___sys_sendmsgnet/socket.c:2638[enl\u00ednea]__sys_sendmsg+0x2b0/0x3a0net/socket.c:2667do_syscall_64+0xf9/0x240entrada_SYSCALL_64_after_hwframe+0x6f/0x77Liberadoporlatarea16:kasan_save_stackmm/kasan/common.c:47[enl\u00ednea]kasan_save_track+0x3f/0x80mm/kasan/common.c:68kasan_save_free_info+0x4e/0x60mm/kasan/generic.c:640veneno_slab_object+0xa6/0xe0m---truncado--