Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-26861— wireguard: receive: annotate data-race around receiving_counter.counter

EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-26861

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wireguard: receive: annotate data-race around receiving_counter.counter
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wireguard: receive: annotate data-race around receiving_counter.counter Syzkaller with KCSAN identified a data-race issue when accessing keypair->receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE() annotations to mark the data race as intentional. BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0: counter_validate drivers/net/wireguard/receive.c:321 [inline] wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461 __napi_poll+0x60/0x3b0 net/core/dev.c:6536 napi_poll net/core/dev.c:6605 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6738 __do_softirq+0xc4/0x279 kernel/softirq.c:553 do_softirq+0x5e/0x90 kernel/softirq.c:454 __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:2633 [inline] ... read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1: decrypt_packet drivers/net/wireguard/receive.c:252 [inline] wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501 process_one_work kernel/workqueue.c:2633 [inline] process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706 worker_thread+0x525/0x730 kernel/workqueue.c:2787 ...
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于Syzkaller 和 KCSAN 在访问 keypair->receiving_counter.counter 时发现了数据争用问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux a9e90d9931f3a474f04bab782ccd9d77904941e9 ~ f87884e0dffd61b47e58bc6e1e2f6843c212b0cc -
LinuxLinux 5.7 -

II. Public POCs for CVE-2024-26861

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-26861

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-04-17 · 100 CVEs total

CVE-2024-26884bpf: Fix hashtab overflow check on 32-bit arches
CVE-2024-26878quota: Fix potential NULL pointer dereference
CVE-2024-26874drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
CVE-2024-26873scsi: hisi_sas: Fix a deadlock issue related to automatic dump
CVE-2024-26872RDMA/srpt: Do not register event handler until srpt device is fully setup
CVE-2024-26871f2fs: fix NULL pointer dereference in f2fs_submit_page_write()
CVE-2024-26870NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
CVE-2024-26875media: pvrusb2: fix uaf in pvr2_context_set_notify
CVE-2024-26882net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
CVE-2024-26883bpf: Fix stackmap overflow check on 32-bit arches
CVE-2024-26881net: hns3: fix kernel crash when 1588 is received on HIP08 devices
CVE-2024-26885bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
CVE-2024-26886Bluetooth: af_bluetooth: Fix deadlock
CVE-2024-26887Bluetooth: btusb: Fix memory leak
CVE-2024-26888Bluetooth: msft: Fix memory leak
CVE-2024-26889Bluetooth: hci_core: Fix possible buffer overflow
CVE-2024-26890Bluetooth: btrtl: fix out of bounds memory access
CVE-2024-26891iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected
CVE-2024-26892wifi: mt76: mt7921e: fix use-after-free in free_irq()
CVE-2024-26893firmware: arm_scmi: Fix double free in SMC transport cleanup path

Showing top 20 of 100 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-26861

No comments yet


Leave a comment