"value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: geneve: Se corrige el problema de uso despu\u00e9s de la liberaci\u00f3n en geneve_find_dev(). syzkaller report\u00f3 un problema de uso despu\u00e9s de la liberaci\u00f3n en geneve_find_dev() [0] sin reproducci\u00f3n. geneve_configure() vincula la estructura geneve_dev.next con net_generic(net, geneve_net_id)->geneve_list. La red aqu\u00ed podr\u00eda diferir de dev_net(dev) si se configura IFLA_NET_NS_PID, IFLA_NET_NS_FD o IFLA_TARGET_NETNSID. Al desmantelar dev_net(dev), geneve_exit_batch_rtnl() finalmente llama a unregister_netdevice_queue() para cada dispositivo en la red, y posteriormente se libera el dispositivo. Sin embargo, su geneve_dev.next a\u00fan est\u00e1 vinculado a la red del socket UDP del backend. Entonces, se producir\u00e1 un \"use-after-free\" al crear otro \"geneve dev\" en la red. En su lugar, llamaremos a \"geneve_dellink()\" en \"geneve_destroy_tunnels()\".[0]:ERROR:KASAN:slab-use-after-freeingeneve_find_devdrivers/net/geneve.c:1295[inline]BUG:KASAN:slab-use-after-freeingeneve_configure+0x234/0x858drivers/net/geneve.c:1343Readofsize2ataddrffff000054d6ee24bytasksyz.1.4029/13441CPU:1UID:0PID:13441Comm:syz.1.4029Nottainted6.13.0-g0ad9617c78ac#24dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3dHardwarename:linux,dummy-virt(DT)Calltrace:show_stack+0x38/0x50arch/arm64/kernel/stacktrace.c:466(C)__dump_stacklib/dump_stack.c:94[inline]dump_stack_lvl+0xbc/0x108lib/dump_stack.c:120print_address_descriptionmm/kasan/report.c:378[inline]print_report+0x16c/0x6f0mm/kasan/report.c:489kasan_report+0xc0/0x120mm/kasan/report.c:602__asan_report_load2_noabort+0x20/0x30mm/kasan/report_generic.c:379geneve_find_devdrivers/net/geneve.c:1295[inline]geneve_configure+0x234/0x858drivers/net/geneve.c:1343geneve_newlink+0xb8/0x128drivers/net/geneve.c:1634rtnl_newlink_create+0x23c/0x868net/core/rtnetlink.c:3795__rtnl_newlinknet/core/rtnetlink.c:3906[inline]rtnl_newlink+0x1054/0x1630net/core/rtnetlink.c:4021rtnetlink_rcv_msg+0x61c/0x918net/core/rtnetlink.c:6911netlink_rcv_skb+0x1dc/0x398net/netlink/af_netlink.c:2543rtnetlink_rcv+0x34/0x50net/core/rtnetlink.c:6938netlink_unicast_kernelnet/netlink/af_netlink.c:1322[inline]netlink_unicast+0x618/0x838net/netlink/af_netlink.c:1348netlink_sendmsg+0x5fc/0x8b0net/netlink/af_netlink.c:1892sock_sendmsg_nosecnet/socket.c:713[inline]__sock_sendmsgnet/socket.c:728[inline]____sys_sendmsg+0x410/0x6f8net/socket.c:2568___sys_sendmsg+0x178/0x1d8net/socket.c:2622__sys_sendmsgnet/socket.c:2654[inline]__do_sys_sendmsgnet/socket.c:2659[inline]__se_sys_sendmsgnet/socket.c:2657[inline]__arm64_sys_sendmsg+0x12c/0x1c8net/socket.c:2657__invoke_syscallarch/arm64/kernel/syscall.c:35[inline]invoke_syscall+0x90/0x278arch/arm64/kernel/syscall.c:49el0_svc_common+0x13c/0x250arch/arm64/kernel/syscall.c:132do_el0_svc+0x54/0x70arch/arm64/kernel/syscall.c:151el0_svc+0x4c/0xa8arch/arm64/kernel/entry-common.c:744el0t_64_sync_handler+0x78/0x108arch/arm64/kernel/entry-common.c:762el0t_64_sync+0x198/0x1a0arch/arm64/kernel/entry.S:600Allocatedbytask13247:kasan_save_stackmm/kasan/common.c:47[inline]kasan_save_track+0x30/0x68mm/kasan/common.c:68kasan_save_alloc_info+0x44/0x58mm/kasan/generic.c:568poison_kmalloc_redzonemm/kasan/common.c:377[inline]__kasan_kmalloc+0x84/0xa0mm/kasan/common.c:394kasan_kmallocinclude/linux/kasan.h:260[inline]__do_kmalloc_nodemm/slub.c:4298[inline]__kmalloc_node_noprof+0x2a0/0x560mm/slub.c:4304__kvmalloc_node_noprof+0x9c/0x230mm/util.c:645alloc_netdev_mqs+0xb8/0x11a0net/core/dev.c:11470rtnl_create_link+0x2b8/0xb50net/core/rtnetlink.c:3604rtnl_newlink_create+0x19c/0x868net/core/rtnetlink.c:3780__rtnl_newlinknet/core/rtnetlink.c:3906[inline]rtnl_newlink+0x1054/0x1630net/core/rtnetlink.c:4021rtnetlink_rcv_msg+0x61c/0x918net/core/rtnetlink.c:6911netlink_rcv_skb+0x1dc/0x398net/netlink/af_netlink.c:2543rtnetlink_rcv+0x34/0x50net/core/rtnetlink.c:6938netlink_uni