{"uuid": "1dfbe04b-a43a-4249-8614-1dc5f68177da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57900", "type": "seen", "source": "https://t.me/cvedetector/15447", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57900 - \"Linux ILA Net Hooks Registration Race Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-57900 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nila: serialize calls to nf_register_net_hooks()  \n  \nsyzbot found a race in ila_add_mapping() [1]  \n  \ncommit 031ae72825ce (\"ila: call nf_unregister_net_hooks() sooner\")  \nattempted to fix a similar issue.  \n  \nLooking at the syzbot repro, we have concurrent ILA_CMD_ADD commands.  \n  \nAdd a mutex to make sure at most one thread is calling nf_register_net_hooks().  \n  \n[1]  \n BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline]  \n BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604  \nRead of size 4 at addr ffff888028f40008 by task dhcpcd/5501  \n  \nCPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0  \nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024  \nCall Trace:  \n   \n  __dump_stack lib/dump_stack.c:94 [inline]  \n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120  \n  print_address_description mm/kasan/report.c:378 [inline]  \n  print_report+0xc3/0x620 mm/kasan/report.c:489  \n  kasan_report+0xd9/0x110 mm/kasan/report.c:602  \n  rht_key_hashfn include/linux/rhashtable.h:159 [inline]  \n  __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604  \n  rhashtable_lookup include/linux/rhashtable.h:646 [inline]  \n  rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]  \n  ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline]  \n  ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline]  \n  ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185  \n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]  \n  nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626  \n  nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269  \n  NF_HOOK include/linux/netfilter.h:312 [inline]  \n  ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309  \n  __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672  \n  __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785  \n  process_backlog+0x443/0x15f0 net/core/dev.c:6117  \n  __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883  \n  napi_poll net/core/dev.c:6952 [inline]  \n  net_rx_action+0xa94/0x1010 net/core/dev.c:7074  \n  handle_softirqs+0x213/0x8f0 kernel/softirq.c:561  \n  __do_softirq kernel/softirq.c:595 [inline]  \n  invoke_softirq kernel/softirq.c:435 [inline]  \n  __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662  \n  irq_exit_rcu+0x9/0x30 kernel/softirq.c:678  \n  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]  \n  sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:06:48.000000Z"}