๐Ÿ” CVE Alert

CVE-2024-50130

HIGH 7.8

netfilter: bpf: must hold reference on net namespace

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: must hold reference on net namespace BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0 Read of size 8 at addr ffff8880106fe400 by task repro/72= bpf_nf_link_release+0xda/0x1e0 bpf_link_free+0x139/0x2d0 bpf_link_release+0x68/0x80 __fput+0x414/0xb60 Eric says: It seems that bpf was able to defer the __nf_unregister_net_hook() after exit()/close() time. Perhaps a netns reference is missing, because the netns has been dismantled/freed already. bpf_nf_link_attach() does : link->net = net; But I do not see a reference being taken on net. Add such a reference and release it after hook unreg. Note that I was unable to get syzbot reproducer to work, so I do not know if this resolves this splat.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
84601d6ee68ae820dec97450934797046d62db4b < f41bd93b3e0508edc7ba820357f949071dcc0acc 84601d6ee68ae820dec97450934797046d62db4b < d0d7939543a1b3bb93af9a18d258a774daf8f162 84601d6ee68ae820dec97450934797046d62db4b < 1230fe7ad3974f7bf6c78901473e039b34d4fb1f
Linux / Linux
6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f41bd93b3e0508edc7ba820357f949071dcc0acc git.kernel.org: https://git.kernel.org/stable/c/d0d7939543a1b3bb93af9a18d258a774daf8f162 git.kernel.org: https://git.kernel.org/stable/c/1230fe7ad3974f7bf6c78901473e039b34d4fb1f