CVE-2024-26626

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26626
Downstream
Published
2024-03-06T06:45:33.826Z
Modified
2025-12-05T03:10:33.958274Z
Summary
ipmr: fix kernel panic when forwarding mcast packets
Details

In the Linux kernel, the following vulnerability has been resolved:

ipmr: fix kernel panic when forwarding mcast packets

The stacktrace was: [ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092 [ 86.306815] #PF: supervisor read access in kernel mode [ 86.307717] #PF: errorcode(0x0000) - not-present page [ 86.308624] PGD 0 P4D 0 [ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1 [ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014 [ 86.312728] RIP: 0010:ipmrforward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f [ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246 [ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000 [ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000 [ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80 [ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000 [ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0 [ 86.326589] Call Trace: [ 86.327036] <TASK> [ 86.327434] ? showregs (/build/work/knet/arch/x86/kernel/dumpstack.c:479) [ 86.328049] ? _die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434) [ 86.328508] ? pagefaultoops (/build/work/knet/arch/x86/mm/fault.c:707) [ 86.329107] ? douseraddrfault (/build/work/knet/arch/x86/mm/fault.c:1264) [ 86.329756] ? srsoreturnthunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.330350] ? _irqworkqueuelocal (/build/work/knet/kernel/irqwork.c:111 (discriminator 1)) [ 86.331013] ? excpagefault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563) [ 86.331702] ? asmexcpagefault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570) [ 86.332468] ? ipmrforward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.333183] ? srsoreturnthunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.333920] ipmrmfcadd (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273) [ 86.334583] ? _pfxipmrhashcmp (/build/work/knet/net/ipv4/ipmr.c:363) [ 86.335357] ipmroutesetsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.336135] ? srsoreturnthunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.336854] ? ipmroutesetsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.337679] doipsetsockopt (/build/work/knet/net/ipv4/ipsockglue.c:944) [ 86.338408] ? _pfxunixstreamreadactor (/build/work/knet/net/unix/afunix.c:2862) [ 86.339232] ? srsoreturnthunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.339809] ? aaskperm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181) [ 86.340342] ipsetsockopt (/build/work/knet/net/ipv4/ipsockglue.c:1415) [ 86.340859] rawsetsockopt (/build/work/knet/net/ipv4/raw.c:836) [ 86.341408] ? securitysocketsetsockopt (/build/work/knet/security/security.c:4561 (discriminator 13)) [ 86.342116] sockcommonsetsockopt (/build/work/knet/net/core/sock.c:3716) [ 86.342747] dosocksetsockopt (/build/work/knet/net/socket.c:2313) [ 86.343363] _syssetsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn ---truncated---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26626.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f69365e3a7cab819099249c50b39f4450fdddc60
Fixed
d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b32e63f881432bf30f282328b8e64c6aa494ba2
Fixed
dcaafdba6c6162bb49f1192850bc3bbc3707738c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7d97858e21fbc472acda7d908357c5fe54a8e439
Fixed
2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb7403655b3c3eb245d0ee330047cd3e20b3c4af
Fixed
e622502c310f1069fd9f41cd38210553115f610a

Affected versions

v6.*

v6.1.75
v6.1.76
v6.6.14
v6.6.15
v6.7
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.2
v6.7.3
v6.8-rc1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26626.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.1.75
Fixed
6.1.77
Type
ECOSYSTEM
Events
Introduced
6.6.14
Fixed
6.6.16
Type
ECOSYSTEM
Events
Introduced
6.7.2
Fixed
6.7.4

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26626.json"