一、漏洞信息
漏洞编号:[CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644)
漏洞归属组件:[kernel](https://gitee.com/src-openeuler/kernel)
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:N/A None
Vector:CVSS:3.0/
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:net/ipv6: release expired exception dst cached in socketDst objects get leaked in ip6_negative_advice() when this function isexecuted for an expired IPv6 route located in the exception table. Thereare several conditions that must be fulfilled for the leak to occur:* an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created* a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions* after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dstWhen TCP executes ip6_negative_advice() for an exception dst that hasexpired and if no other socket holds a reference to the exception dst, therefcount of the exception dst is 2, which corresponds to the incrementmade by dst_init() and the increment made by the TCP socket for which theconnection is timing out. The refcount made by the socket is neverreleased. The refcount of the dst is decremented in sk_dst_reset() butthat decrement is counteracted by a dst_hold() intentionally placed justbefore the sk_dst_reset() in ip6_negative_advice(). Afterip6_negative_advice() has finished, there is no other object tied to thedst. The socket lost its reference stored in sk_dst_cache and the dst isno longer in the exception table. The exception dst becomes a leakedobject.As a result of this dst leak, an unbalanced refcount is reported for theloopback device of a net namespace being destroyed under kernels that donot contain e5f80fcf869a ( ipv6: give an IPv6 dev to blackhole_netdev ):unregister_netdevice: waiting for lo to become free. Usage count = 2Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). Thepatch that introduced the dst_hold() in ip6_negative_advice() was92f1655aa2b22 ( net: fix __dst_negative_advice() race ). But 92f1655aa2b22merely refactored the code with regards to the dst refcount so the issuewas present even before 92f1655aa2b22. The bug was introduced in54c1a859efd9f ( ipv6: Don t drop cache route entry unless timer actuallyexpired. ) where the expired cached route is deleted and the sk_dst_cachemember of the socket is set to NULL by calling dst_negative_advice() butthe refcount belonging to the socket is left unbalanced.The IPv4 version - ipv4_negative_advice() - is not affected by this bug.When the TCP connection times out ipv4_negative_advice() merely resets thesk_dst_cache of the socket while decrementing the refcount of theexception dst.
漏洞公开时间:2024-12-27 23:15:24
漏洞创建时间:2024-12-27 23:57:22
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-56644
<details>
<summary>更多参考(点击展开)</summary>
| 参考来源 | 参考链接 | 来源链接 |
| ------- | -------- | -------- |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9 | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045 | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/535add1e9f274502209cb997801208bbe1ae6c6f | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8b591bd522b71c42a82898290e35d32b482047e4 | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a95808252e8acc0123bacd2dff8b9af10bc145b7 | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b90d061345bb8cd51fece561a800bae1c95448a6 | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2 | |
| suse_bugzilla | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-56644 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://www.cve.org/CVERecord?id=CVE-2024-56644 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/535add1e9f274502209cb997801208bbe1ae6c6f | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/8b591bd522b71c42a82898290e35d32b482047e4 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/a95808252e8acc0123bacd2dff8b9af10bc145b7 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/b90d061345bb8cd51fece561a800bae1c95448a6 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/stable/c/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-56644.mbox | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| suse_bugzilla | https://bugzilla.redhat.com/show_bug.cgi?id=2334551 | https://bugzilla.suse.com/show_bug.cgi?id=1235133 |
| redhat_bugzilla | https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/T | https://bugzilla.redhat.com/show_bug.cgi?id=2334551 |
| debian | | https://security-tracker.debian.org/tracker/CVE-2024-56644 |
| anolis | | https://anas.openanolis.cn/cves/detail/CVE-2024-56644 |
| mageia | | http://advisories.mageia.org/MGASA-2025-0030.html |
| osv | https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/535add1e9f274502209cb997801208bbe1ae6c6f | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/8b591bd522b71c42a82898290e35d32b482047e4 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/a95808252e8acc0123bacd2dff8b9af10bc145b7 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/b90d061345bb8cd51fece561a800bae1c95448a6 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://git.kernel.org/stable/c/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2 | https://osv.dev/vulnerability/CVE-2024-56644 |
| osv | https://security-tracker.debian.org/tracker/CVE-2024-56644 | https://osv.dev/vulnerability/CVE-2024-56644 |
</details>
漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:
<details>
<summary>详情(点击展开)</summary>
| 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 |
| ------- | -------- | ------- | -------- | --------- |
| linux_kernel | 5.4.287 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=a95808252e8acc0123bacd2dff8b9af10bc145b7Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 5.10.231 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b90d061345bb8cd51fece561a800bae1c95448a6Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 5.15.174 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0b8903e6c881f72c6849d4952de742c656eb5ab9Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 6.1.120 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=535add1e9f274502209cb997801208bbe1ae6c6fIssue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 6.6.66 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f43d12fd0fa8ee5b9caf8a3927e10d06431764d2Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 6.12.5 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8b591bd522b71c42a82898290e35d32b482047e4Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
| linux_kernel | 6.13-rc2 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045Issue | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=54c1a859efd9fd6cda05bc700315ba2519c14eba | linuxkernelcves |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:net/ipv6: release expired exception dst cached in socketDst objects get leaked in ip6_negative_advice() when this function isexecuted for an expired IPv6 route located in the exception table. Thereare several conditions that must be fulfilled for the leak to occur:* an ICMPv6 packet indicating a change of the MTU for the path is received, resulting in an exception dst being created* a TCP connection that uses the exception dst for routing packets must start timing out so that TCP begins retransmissions* after the exception dst expires, the FIB6 garbage collector must not run before TCP executes ip6_negative_advice() for the expired exception dstWhen TCP executes ip6_negative_advice() for an exception dst that hasexpired and if no other socket holds a reference to the exception dst, therefcount of the exception dst is 2, which corresponds to the incrementmade by dst_init() and the increment made by the TCP socket for which theconnection is timing out. The refcount made by the socket is neverreleased. The refcount of the dst is decremented in sk_dst_reset() butthat decrement is counteracted by a dst_hold() intentionally placed justbefore the sk_dst_reset() in ip6_negative_advice(). Afterip6_negative_advice() has finished, there is no other object tied to thedst. The socket lost its reference stored in sk_dst_cache and the dst isno longer in the exception table. The exception dst becomes a leakedobject.As a result of this dst leak, an unbalanced refcount is reported for theloopback device of a net namespace being destroyed under kernels that donot contain e5f80fcf869a ( ipv6: give an IPv6 dev to blackhole_netdev ):unregister_netdevice: waiting for lo to become free. Usage count = 2Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). Thepatch that introduced the dst_hold() in ip6_negative_advice() was92f1655aa2b22 ( net: fix __dst_negative_advice() race ). But 92f1655aa2b22merely refactored the code with regards to the dst refcount so the issuewas present even before 92f1655aa2b22. The bug was introduced in54c1a859efd9f ( ipv6: Don t drop cache route entry unless timer actuallyexpired. ) where the expired cached route is deleted and the sk_dst_cachemember of the socket is set to NULL by calling dst_negative_advice() butthe refcount belonging to the socket is left unbalanced.The IPv4 version - ipv4_negative_advice() - is not affected by this bug.When the TCP connection times out ipv4_negative_advice() merely resets thesk_dst_cache of the socket while decrementing the refcount of theexception dst.
openEuler评分:
2.5
Vector:CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP3(5.10.0):受影响
3.openEuler-22.03-LTS-SP4(5.10.0):受影响
4.openEuler-24.03-LTS(6.6.0):受影响
5.openEuler-24.03-LTS-SP1(6.6.0):受影响
6.master(6.6.0):不受影响
7.openEuler-24.03-LTS-Next(6.6.0):不受影响
修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP3(5.10.0):否
3.master(6.6.0):否
4.openEuler-24.03-LTS(6.6.0):否
5.openEuler-24.03-LTS-Next(6.6.0):否
6.openEuler-22.03-LTS-SP4(5.10.0):否
7.openEuler-24.03-LTS-SP1(6.6.0):否
原因说明:
1.openEuler-24.03-LTS(6.6.0):正常修复
2.openEuler-24.03-LTS-SP1(6.6.0):正常修复
3.openEuler-20.03-LTS-SP4(4.19.90):不修复-超出修复范围
4.openEuler-22.03-LTS-SP3(5.10.0):不修复-超出修复范围
5.openEuler-22.03-LTS-SP4(5.10.0):不修复-超出修复范围
6.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
7.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发
三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-1450