๐Ÿ” CVE Alert

CVE-2024-50257

HIGH 7.8

netfilter: Fix use-after-free in get_info()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: Fix use-after-free in get_info() ip6table_nat module unload has refcnt warning for UAF. call trace is: WARNING: CPU: 1 PID: 379 at kernel/module/main.c:853 module_put+0x6f/0x80 Modules linked in: ip6table_nat(-) CPU: 1 UID: 0 PID: 379 Comm: ip6tables Not tainted 6.12.0-rc4-00047-gc2ee9f594da8-dirty #205 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:module_put+0x6f/0x80 Call Trace: <TASK> get_info+0x128/0x180 do_ip6t_get_ctl+0x6a/0x430 nf_getsockopt+0x46/0x80 ipv6_getsockopt+0xb9/0x100 rawv6_getsockopt+0x42/0x190 do_sock_getsockopt+0xaa/0x180 __sys_getsockopt+0x70/0xc0 __x64_sys_getsockopt+0x20/0x30 do_syscall_64+0xa2/0x1a0 entry_SYSCALL_64_after_hwframe+0x77/0x7f Concurrent execution of module unload and get_info() trigered the warning. The root cause is as follows: cpu0 cpu1 module_exit //mod->state = MODULE_STATE_GOING ip6table_nat_exit xt_unregister_template kfree(t) //removed from templ_list getinfo() t = xt_find_table_lock list_for_each_entry(tmpl, &xt_templates[af]...) if (strcmp(tmpl->name, name)) continue; //table not found try_module_get list_for_each_entry(t, &xt_net->tables[af]...) return t; //not get refcnt module_put(t->me) //uaf unregister_pernet_subsys //remove table from xt_net list While xt_table module was going away and has been removed from xt_templates list, we couldnt get refcnt of xt_table->me. Check module in xt_net->tables list re-traversal to fix it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 < ba22ea01348384df19cc1fabc7964be6e7189749 fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 < cb7c388b5967946f097afdb759b7c860305f2d96 fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 < 6a1f088f9807f5166f58902d26246d0b88da03a8 fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 < bab3bb35c03b263c486833d50d50c081d9e9832b fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 < f48d258f0ac540f00fa617dac496c4c18b5dc2fa
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ba22ea01348384df19cc1fabc7964be6e7189749 git.kernel.org: https://git.kernel.org/stable/c/cb7c388b5967946f097afdb759b7c860305f2d96 git.kernel.org: https://git.kernel.org/stable/c/6a1f088f9807f5166f58902d26246d0b88da03a8 git.kernel.org: https://git.kernel.org/stable/c/bab3bb35c03b263c486833d50d50c081d9e9832b git.kernel.org: https://git.kernel.org/stable/c/f48d258f0ac540f00fa617dac496c4c18b5dc2fa lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html