In the Linux kernel, the following vulnerability has been resolved:
sched: actct: take care of padding in struct zonesht_key
Blamed commit increased lookup key size from 2 bytes to 16 bytes, because zoneshtkey got a struct net pointer.
Make sure rhashtable_lookup() is not using the padding bytes which are not initialized.
BUG: KMSAN: uninit-value in rhtptrrcu include/linux/rhashtable.h:376 [inline] BUG: KMSAN: uninit-value in rhashtablelookup include/linux/rhashtable.h:607 [inline] BUG: KMSAN: uninit-value in rhashtablelookup include/linux/rhashtable.h:646 [inline] BUG: KMSAN: uninit-value in rhashtablelookupfast include/linux/rhashtable.h:672 [inline] BUG: KMSAN: uninit-value in tcfctflowtableget+0x611/0x2260 net/sched/actct.c:329 rhtptrrcu include/linux/rhashtable.h:376 [inline] _rhashtablelookup include/linux/rhashtable.h:607 [inline] rhashtablelookup include/linux/rhashtable.h:646 [inline] rhashtablelookupfast include/linux/rhashtable.h:672 [inline] tcfctflowtableget+0x611/0x2260 net/sched/actct.c:329 tcfctinit+0xa67/0x2890 net/sched/actct.c:1408 tcfactioninit1+0x6cc/0xb30 net/sched/actapi.c:1425 tcfactioninit+0x458/0xf00 net/sched/actapi.c:1488 tcfactionadd net/sched/actapi.c:2061 [inline] tcctlaction+0x4be/0x19d0 net/sched/actapi.c:2118 rtnetlinkrcvmsg+0x12fc/0x1410 net/core/rtnetlink.c:6647 netlinkrcvskb+0x375/0x650 net/netlink/afnetlink.c:2550 rtnetlinkrcv+0x34/0x40 net/core/rtnetlink.c:6665 netlinkunicastkernel net/netlink/afnetlink.c:1331 [inline] netlinkunicast+0xf52/0x1260 net/netlink/afnetlink.c:1357 netlinksendmsg+0x10da/0x11e0 net/netlink/afnetlink.c:1901 socksendmsgnosec net/socket.c:730 [inline] _socksendmsg+0x30f/0x380 net/socket.c:745 syssendmsg+0x877/0xb60 net/socket.c:2597 _syssendmsg+0x28d/0x3c0 net/socket.c:2651 _syssendmsg net/socket.c:2680 [inline] _dosyssendmsg net/socket.c:2689 [inline] _sesyssendmsg net/socket.c:2687 [inline] _x64syssendmsg+0x307/0x4a0 net/socket.c:2687 x64syscall+0x2dd6/0x3c10 arch/x86/include/generated/asm/syscalls64.h:47 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xcd/0x1e0 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f
Local variable key created at: tcfctflowtableget+0x4a/0x2260 net/sched/actct.c:324 tcfctinit+0xa67/0x2890 net/sched/actct.c:1408
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-14cb0867", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ddefcb8f75e312535e2e7d5fef9932019ba60f2" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-2abf101c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c03ab555eb1ba26c77fd7c25bdf44a0ac23edee" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-3a923594", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2191a54f63225b548fd8346be3611c3219a24738" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-b69c58f2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a5b68869dbe14f1157c6a24ac71923db060eeab" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-be6260c8", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d7cc186d0973afce0e1237c37f7512c01981fb79" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "net/sched/act_ct.c" }, "deprecated": false, "digest": { "line_hashes": [ "29462327311403041943181949013414395376", "133676314839697514315787485905498199863", "201178060094332687397629076099668101596", "279116153860156452563767299421739306889", "144301035380230140047723294685088972254", "241697515191806774685637802098375896781", "248527978478361952927769935865928895927", "279062268354751710418384011598719574106" ], "threshold": 0.9 }, "id": "CVE-2024-42272-ef1e6d68", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06daf0ad645d9225a3ff6958dd82e1f3988fa64" } ] }