2024-09-18 10:03:21 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2024-46771",
|
|
|
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"published": "2024-09-18T08:15:05.010",
|
2024-11-20 19:03:23 +00:00
|
|
|
"lastModified": "2024-11-20T18:20:03.130",
|
|
|
|
"vulnStatus": "Analyzed",
|
2024-09-18 10:03:21 +00:00
|
|
|
"cveTags": [],
|
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Remove proc entry when dev is unregistered.\n\nsyzkaller reported a warning in bcm_connect() below. [0]\n\nThe repro calls connect() to vxcan1, removes vxcan1, and calls\nconnect() with ifindex == 0.\n\nCalling connect() for a BCM socket allocates a proc entry.\nThen, bcm_sk(sk)->bound is set to 1 to prevent further connect().\n\nHowever, removing the bound device resets bcm_sk(sk)->bound to 0\nin bcm_notify().\n\nThe 2nd connect() tries to allocate a proc entry with the same\nname and sets NULL to bcm_sk(sk)->bcm_proc_read, leaking the\noriginal proc entry.\n\nSince the proc entry is available only for connect()ed sockets,\nlet's clean up the entry when the bound netdev is unregistered.\n\n[0]:\nproc_dir_entry 'can-bcm/2456' already registered\nWARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375\nModules linked in:\nCPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375\nCode: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48\nRSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246\nRAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002\nRBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0\nR10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec\nFS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220\n bcm_connect+0x472/0x840 net/can/bcm.c:1673\n __sys_connect_file net/socket.c:2049 [inline]\n __sys_connect+0x5d2/0x690 net/socket.c:2066\n __do_sys_connect net/socket.c:2076 [inline]\n __se_sys_connect net/socket.c:2073 [inline]\n __x64_sys_connect+0x8f/0x100 net/socket.c:2073\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fbd708b0e5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d\nRDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003\nRBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040\nR10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098\nR13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000\n </TASK>\nremove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'"
|
2024-09-20 14:03:57 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"lang": "es",
|
|
|
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: Eliminar entrada proc cuando dev no est\u00e1 registrado. syzkaller inform\u00f3 una advertencia en bcm_connect() a continuaci\u00f3n. [0] La repro llama a connect() a vxcan1, elimina vxcan1 y llama a connect() con ifindex == 0. Llamar a connect() para un socket BCM asigna una entrada proc. Luego, bcm_sk(sk)->bound se establece en 1 para evitar m\u00e1s connect(). Sin embargo, eliminar el dispositivo vinculado restablece bcm_sk(sk)->bound a 0 en bcm_notify(). El segundo connect() intenta asignar una entrada proc con el mismo nombre y establece NULL en bcm_sk(sk)->bcm_proc_read, filtrando la entrada proc original. Dado que la entrada proc solo est\u00e1 disponible para sockets conectados, limpiemos la entrada cuando el netdev vinculado no est\u00e9 registrado. [0]: proc_dir_entry 'can-bcm/2456' ya est\u00e1 registrado ADVERTENCIA: CPU: 1 PID: 394 en fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375 M\u00f3dulos vinculados en: CPU: 1 PID: 394 Comm: syz-executor403 No contaminado 6.10.0-rc7-g852e42cc2dd4 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375 C\u00f3digo: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48 RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246 RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0 R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec FS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220 bcm_connect+0x472/0x840 net/can/bcm.c:1673 __sys_connect_file net/socket.c:2049 [en l\u00ednea] __sys_connect+0x5d2/0x690 net/socket.c:2066 __do_sys_connect net/socket.c:2076 [en l\u00ednea] __se_sys_connect net/socket.c:2073 [en l\u00ednea] __x64_sys_connect+0x8f/0x100 net/socket.c:2073 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7fbd708b0e5d C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040 R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098 R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000 remove_proc_entry: elimina el directorio no vac\u00edo 'net/can-bcm', filtrando al menos '2456'"
|
2024-09-18 10:03:21 +00:00
|
|
|
}
|
|
|
|
],
|
2024-11-20 19:03:23 +00:00
|
|
|
"metrics": {
|
|
|
|
"cvssMetricV31": [
|
|
|
|
{
|
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
|
|
|
"cvssData": {
|
|
|
|
"version": "3.1",
|
|
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
2024-12-08 03:06:42 +00:00
|
|
|
"baseScore": 5.5,
|
|
|
|
"baseSeverity": "MEDIUM",
|
2024-11-20 19:03:23 +00:00
|
|
|
"attackVector": "LOCAL",
|
|
|
|
"attackComplexity": "LOW",
|
|
|
|
"privilegesRequired": "LOW",
|
|
|
|
"userInteraction": "NONE",
|
|
|
|
"scope": "UNCHANGED",
|
|
|
|
"confidentialityImpact": "NONE",
|
|
|
|
"integrityImpact": "NONE",
|
2024-12-08 03:06:42 +00:00
|
|
|
"availabilityImpact": "HIGH"
|
2024-11-20 19:03:23 +00:00
|
|
|
},
|
|
|
|
"exploitabilityScore": 1.8,
|
|
|
|
"impactScore": 3.6
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"weaknesses": [
|
|
|
|
{
|
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "NVD-CWE-noinfo"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"configurations": [
|
|
|
|
{
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "2.6.25",
|
|
|
|
"versionEndExcluding": "4.19.322",
|
|
|
|
"matchCriteriaId": "FDD41833-5EF3-4E8B-BD2B-83D6DF670AAA"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "4.20",
|
|
|
|
"versionEndExcluding": "5.4.284",
|
|
|
|
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "5.5",
|
|
|
|
"versionEndExcluding": "5.10.226",
|
|
|
|
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "5.11",
|
|
|
|
"versionEndExcluding": "5.15.167",
|
|
|
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "5.16",
|
|
|
|
"versionEndExcluding": "6.1.110",
|
|
|
|
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "6.2",
|
|
|
|
"versionEndExcluding": "6.6.51",
|
|
|
|
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
|
|
"versionStartIncluding": "6.7",
|
|
|
|
"versionEndExcluding": "6.10.10",
|
|
|
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
2024-09-18 10:03:21 +00:00
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849",
|
2024-11-20 19:03:23 +00:00
|
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
|
|
"tags": [
|
|
|
|
"Patch"
|
|
|
|
]
|
2024-09-18 10:03:21 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|