• 公告ID (KylinSec-SA-2024-3181)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list)

Second problem is a read from dev->ip6_ptr with no NULL check:

if (!list_empty(&rcu_dereference(dev->ip6_ptr)->addr_list))

Use the correct RCU API to fix these.

v2: add missing include <net/addrconf.h&gt;

安全等级: Low

公告ID: KylinSec-SA-2024-3181

发布日期: 2024年7月16日

关联CVE: CVE-2024-35857  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) &amp;&amp; __in_dev_get_rcu(dev)-&gt;ifa_list)

Second problem is a read from dev-&gt;ip6_ptr with no NULL check:

if (!list_empty(&amp;rcu_dereference(dev-&gt;ip6_ptr)-&gt;addr_list))

Use the correct RCU API to fix these.

v2: add missing include <net/addrconf.h&gt;

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-35857 KY3.4-5A kernel Unaffected
CVE-2024-35857 KY3.5.2 kernel Unaffected
CVE-2024-35857 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3180 下一篇:KylinSec-SA-2024-4729