Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-26631— ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work

EPSS 0.01% · P2
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-26631

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work idev->mc_ifc_count can be written over without proper locking. Originally found by syzbot [1], fix this issue by encapsulating calls to mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with mutex_lock() and mutex_unlock() accordingly as these functions should only be called with mc_lock per their declarations. [1] BUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work write to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0: mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline] ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725 addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949 addrconf_notify+0x310/0x980 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461 __dev_notify_flags+0x205/0x3d0 dev_change_flags+0xab/0xd0 net/core/dev.c:8685 do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916 rtnl_group_changelink net/core/rtnetlink.c:3458 [inline] __rtnl_newlink net/core/rtnetlink.c:3717 [inline] rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754 rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline] netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910 ... write to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1: mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653 process_one_work kernel/workqueue.c:2627 [inline] process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700 worker_thread+0x525/0x730 kernel/workqueue.c:2781 ...
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于idev->mc_ifc_count允许在没有适当锁定的情况下被重写。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 2d9a93b4902be6a5504b5941dd15e9cd776aadca ~ 62b3387beef11738eb6ce667601a28fa089fa02c -
LinuxLinux 5.13 -

II. Public POCs for CVE-2024-26631

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-26631

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-03-18 · 21 CVEs total

CVE-2024-26634net: fix removing a namespace with conflicting altnames
CVE-2024-26641ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
CVE-2024-26640tcp: add sanity checks to rx zerocopy
CVE-2023-52619pstore/ram: Fix crash when setting number of cpus to an odd number
CVE-2023-52618block/rnbd-srv: Check for unlikely string overflow
CVE-2023-52617PCI: switchtec: Fix stdev_release() crash after surprise hot remove
CVE-2024-26638nbd: always initialize struct msghdr completely
CVE-2024-26636llc: make llc_ui_sendmsg() more robust against bonding changes
CVE-2024-26637wifi: ath11k: rely on mac80211 debugfs handling for vif
CVE-2024-26635llc: Drop support for ETH_P_TR_802_2.
CVE-2023-52609binder: fix race between mmput() and do_exit()
CVE-2023-52616crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init
CVE-2023-52615hwrng: core - Fix page fault dead lock on mmap-ed hwrng
CVE-2023-52614PM / devfreq: Fix buffer overflow in trans_stat_show
CVE-2024-26633ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
CVE-2024-26632block: Fix iterating over an empty bio with bio_for_each_folio_all
CVE-2023-52613drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment
CVE-2023-52612crypto: scomp - fix req->dst buffer overflow
CVE-2023-52611wifi: rtw88: sdio: Honor the host max_req_size in the RX path
CVE-2023-52610net/sched: act_ct: fix skb leak and crash on ooo frags

IV. Related Vulnerabilities

V. Comments for CVE-2024-26631

No comments yet


Leave a comment