CVE-2024-56651

In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630cfff ("can: hi311x: do not report txerr and rxerr during bus-off") removed the reporting of rxerr and txerr even in case of correct operation (i. e. not bus-off). The error count information added to the CAN frame after netif_rx() is a potential use after free, since there is no guarantee that the skb is in the same state. It might be freed or reused. Fix the issue by postponing the netif_rx() call in case of txerr and rxerr reporting.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

History

06 Jan 2025, 19:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1128022009444faf49359bd406cd665b177cb643 - () https://git.kernel.org/stable/c/1128022009444faf49359bd406cd665b177cb643 - Patch
References () https://git.kernel.org/stable/c/4ad77eb8f2e07bcfa0e28887d3c7dbb732d92cc1 - () https://git.kernel.org/stable/c/4ad77eb8f2e07bcfa0e28887d3c7dbb732d92cc1 - Patch
References () https://git.kernel.org/stable/c/9ad86d377ef4a19c75a9c639964879a5b25a433b - () https://git.kernel.org/stable/c/9ad86d377ef4a19c75a9c639964879a5b25a433b - Patch
References () https://git.kernel.org/stable/c/bc30b2fe8c54694f8ae08a5b8a5d174d16d93075 - () https://git.kernel.org/stable/c/bc30b2fe8c54694f8ae08a5b8a5d174d16d93075 - Patch
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: hi311x: hi3110_can_ist(): corrige un posible use-after-free el commit a22bd630cfff ("can: hi311x: no informar txerr y rxerr durante el apagado del bus") eliminó el informe de rxerr y txerr incluso en caso de funcionamiento correcto (es decir, sin apagado del bus). La información del recuento de errores agregada al marco CAN después de netif_rx() es un posible use-after-free, ya que no hay garantía de que el skb esté en el mismo estado. Podría liberarse o reutilizarse. Corrija el problema posponiendo la llamada a netif_rx() en caso de informes de txerr y rxerr.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-56651

Mitre link : CVE-2024-56651

CVE.ORG link : CVE-2024-56651


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free