CVE-2024-40983

In the Linux kernel, the following vulnerability has been resolved: tipc: force a dst refcount before doing decryption As it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before entering the xfrm type handlers"): "Crypto requests might return asynchronous. In this case we leave the rcu protected region, so force a refcount on the skb's destination entry before we enter the xfrm type input/output handlers." On TIPC decryption path it has the same problem, and skb_dst_force() should be called before doing decryption to avoid a possible crash. Shuang reported this issue when this warning is triggered: [] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug [] Workqueue: crypto cryptd_queue_worker [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Call Trace: [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc] [] tipc_rcv+0xcf5/0x1060 [tipc] [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc] [] cryptd_aead_crypt+0xdb/0x190 [] cryptd_queue_worker+0xed/0x190 [] process_one_work+0x93d/0x17e0
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

06 Oct 2025, 20:17

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269 - () https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269 - Patch
References () https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8 - () https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8 - Patch
References () https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2 - () https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2 - Patch
References () https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930 - () https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930 - Patch
References () https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76 - () https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76 - Patch
References () https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93 - () https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93 - Patch

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: forzar un refcount dst antes de realizar el descifrado como dice en el commit 3bc07321ccc2 ("xfrm: forzar un refcount dst antes de ingresar los controladores de tipo xfrm"): "Las solicitudes criptográficas pueden regresar asíncronas En este caso, salimos de la región protegida de rcu, así que fuercemos un recuento en la entrada de destino del skb antes de ingresar los controladores de entrada/salida de tipo xfrm. En la ruta de descifrado TIPC tiene el mismo problema, y se debe llamar a skb_dst_force() antes de realizar el descifrado para evitar un posible bloqueo. Shuang informó este problema cuando se activa esta advertencia: [] ADVERTENCIA: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Kdump: cargado Contaminado: GW --------- - - 4.18.0-496.el8.x86_64+debug [] Cola de trabajo: crypto cryptd_queue_worker [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Seguimiento de llamadas: [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc] [] tipc_rcv+ 0xcf5/0x1060 [tipc] [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc] [] cryptd_aead_crypt+0xdb/0x190 [] cryptd_queue_worker+0xed/0x190 [] Process_one_work+0x93d/0x17e0
References () https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269 - () https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269 -
References () https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8 - () https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8 -
References () https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2 - () https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2 -
References () https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930 - () https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930 -
References () https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76 - () https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76 -
References () https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93 - () https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93 -

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-10-06 20:17


NVD link : CVE-2024-40983

Mitre link : CVE-2024-40983

CVE.ORG link : CVE-2024-40983


JSON object : View

Products Affected

linux

  • linux_kernel