CVE-2024-36907 (GCVE-0-2024-36907)

Vulnerability from cvelistv5 – Published: 2024-05-30 15:29 – Updated: 2025-05-26 10:27
VLAI?

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-05-26T10:27:27.681Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-36907",
    "datePublished": "2024-05-30T15:29:07.193Z",
    "dateRejected": "2025-05-26T10:27:27.681Z",
    "dateReserved": "2024-05-30T15:25:07.067Z",
    "dateUpdated": "2025-05-26T10:27:27.681Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nSUNRPC: add a missing rpc_stat for TCP TLS\\n\\nCommit 1548036ef120 (\\\"nfs: make the rpc_stat per net namespace\\\") added\\nfunctionality to specify rpc_stats function but missed adding it to the\\nTCP TLS functionality. As the result, mounting with xprtsec=tls lead to\\nthe following kernel oops.\\n\\n[  128.984192] Unable to handle kernel NULL pointer dereference at\\nvirtual address 000000000000001c\\n[  128.985058] Mem abort info:\\n[  128.985372]   ESR = 0x0000000096000004\\n[  128.985709]   EC = 0x25: DABT (current EL), IL = 32 bits\\n[  128.986176]   SET = 0, FnV = 0\\n[  128.986521]   EA = 0, S1PTW = 0\\n[  128.986804]   FSC = 0x04: level 0 translation fault\\n[  128.987229] Data abort info:\\n[  128.987597]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\\n[  128.988169]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\\n[  128.988811]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\\n[  128.989302] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000106c84000\\n[  128.990048] [000000000000001c] pgd=0000000000000000, p4d=0000000000000000\\n[  128.990736] Internal error: Oops: 0000000096000004 [#1] SMP\\n[  128.991168] Modules linked in: nfs_layout_nfsv41_files\\nrpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace netfs\\nuinput dm_mod nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib\\nnft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct\\nnft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill\\nip_set nf_tables nfnetlink qrtr vsock_loopback\\nvmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock\\nsunrpc vfat fat uvcvideo videobuf2_vmalloc videobuf2_memops uvc\\nvideobuf2_v4l2 videodev videobuf2_common mc vmw_vmci xfs libcrc32c\\ne1000e crct10dif_ce ghash_ce sha2_ce vmwgfx nvme sha256_arm64\\nnvme_core sr_mod cdrom sha1_ce drm_ttm_helper ttm drm_kms_helper drm\\nsg fuse\\n[  128.996466] CPU: 0 PID: 179 Comm: kworker/u4:26 Kdump: loaded Not\\ntainted 6.8.0-rc6+ #12\\n[  128.997226] Hardware name: VMware, Inc. VMware20,1/VBSA, BIOS\\nVMW201.00V.21805430.BA64.2305221830 05/22/2023\\n[  128.998084] Workqueue: xprtiod xs_tcp_tls_setup_socket [sunrpc]\\n[  128.998701] pstate: 81400005 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\\n[  128.999384] pc : call_start+0x74/0x138 [sunrpc]\\n[  128.999809] lr : __rpc_execute+0xb8/0x3e0 [sunrpc]\\n[  129.000244] sp : ffff8000832b3a00\\n[  129.000508] x29: ffff8000832b3a00 x28: ffff800081ac79c0 x27: ffff800081ac7000\\n[  129.001111] x26: 0000000004248060 x25: 0000000000000000 x24: ffff800081596008\\n[  129.001757] x23: ffff80007b087240 x22: ffff00009a509d30 x21: 0000000000000000\\n[  129.002345] x20: ffff000090075600 x19: ffff00009a509d00 x18: ffffffffffffffff\\n[  129.002912] x17: 733d4d4554535953 x16: 42555300312d746e x15: ffff8000832b3a88\\n[  129.003464] x14: ffffffffffffffff x13: ffff8000832b3a7d x12: 0000000000000008\\n[  129.004021] x11: 0101010101010101 x10: ffff8000150cb560 x9 : ffff80007b087c00\\n[  129.004577] x8 : ffff00009a509de0 x7 : 0000000000000000 x6 : 00000000be8c4ee3\\n[  129.005026] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff000094d56680\\n[  129.005425] x2 : ffff80007b0637f8 x1 : ffff000090075600 x0 : ffff00009a509d00\\n[  129.005824] Call trace:\\n[  129.005967]  call_start+0x74/0x138 [sunrpc]\\n[  129.006233]  __rpc_execute+0xb8/0x3e0 [sunrpc]\\n[  129.006506]  rpc_execute+0x160/0x1d8 [sunrpc]\\n[  129.006778]  rpc_run_task+0x148/0x1f8 [sunrpc]\\n[  129.007204]  tls_probe+0x80/0xd0 [sunrpc]\\n[  129.007460]  rpc_ping+0x28/0x80 [sunrpc]\\n[  129.007715]  rpc_create_xprt+0x134/0x1a0 [sunrpc]\\n[  129.007999]  rpc_create+0x128/0x2a0 [sunrpc]\\n[  129.008264]  xs_tcp_tls_setup_socket+0xdc/0x508 [sunrpc]\\n[  129.008583]  process_one_work+0x174/0x3c8\\n[  129.008813]  worker_thread+0x2c8/0x3e0\\n[  129.009033]  kthread+0x100/0x110\\n[  129.009225]  ret_from_fork+0x10/0x20\\n[  129.009432] Code: f0ffffc2 911fe042 aa1403e1 aa1303e0 (b9401c83)\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: SUNRPC: agrega un rpc_stat faltante para TCP TLS. El commit 1548036ef120 (\\\"nfs: crea rpc_stat por espacio de nombres de red\\\") agreg\\u00f3 funcionalidad para especificar la funci\\u00f3n rpc_stats pero no la agreg\\u00f3 a la funcionalidad TCP TLS. . Como resultado, montar con xprtsec=tls conduce a los siguientes errores del kernel. [128.984192] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\\u00f3n virtual 000000000000001c [128.985058] Informaci\\u00f3n de cancelaci\\u00f3n de memoria: [128.985372] ESR = 0x0000000096000004 [128.985709] EC = 0x25: (EL actual), IL = 32 bits [ 128.986176] SET = 0 , FnV = 0 [ 128.986521] EA = 0, S1PTW = 0 [ 128.986804] FSC = 0x04: error de traducci\\u00f3n de nivel 0 [ 128.987229] Informaci\\u00f3n de cancelaci\\u00f3n de datos: [ 128.987597] ISV = 0, ISS = 0x00000004, ISS2 = 0x000 00000 [ 128.988169] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 128.988811] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 128.989302] tabla de p\\u00e1ginas de usuario: p\\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000106c84000 [ 128.990048] [000000000000001c] pgd=0000000000000000, p4d=0000000000000000 [ 128.990736] Error interno: Ups: 0000000096000004 [#1] SMP [ 168] M\\u00f3dulos vinculados en: nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd Grace netfs uinput dm_mod nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf _rechazar_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock pc vfat fat uvcvideo videobuf2_vmalloc videobuf2_memops uvc videobuf2_v4l2 videodev videobuf2_common mc vmw_vmci xfs libcrc32c e1000e crct10dif_ce ghash_ce sha2_ce vmwgfx nvme sha256_arm64 nvme_core sr_mod cdrom sha1_ce _ttm_helper ttm drm_kms_helper drm sg fusible [ 128.996466 ] CPU: 0 PID: 179 Comm: kworker/u4:26 Kdump: cargado No contaminado 6.8.0-rc6+ #12 [ 128.997226] Nombre de hardware: VMware, Inc. VMware20,1/VBSA, BIOS VMW201.00V.21805430.BA64 .2305221830 22/05/2023 [ 128.998084] Cola de trabajo: xprtiod xs_tcp_tls_setup_socket [sunrpc] [ 128.998701] pstate: 81400005 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 28.999384] ordenador: call_start+0x74/ 0x138 [sunrpc] [128.999809] lr: __rpc_execute+0xb8/0x3e0 [sunrpc] [129.000244] sp: ffff8000832b3a00 [129.000508] x29: ffff8000832b3a00 x28: 0081ac79c0 x27: ffff800081ac7000 [ 129.001111] x26: 0000000004248060 x25: 00000000000000000 x24: ffff800081596008 [ 129.001757] x23: ffff80007b087240 x22: ffff00009a509d30 x21: 0000000000000000 [ 129.002345] x20: ffff000090075600 x19: ffff00009a509d00 x18: [ 129.002912] x17: 733d4d4554535953 x16: 42555300312d746e x15: ffff8000832b3a88 [ 129.003464] x14: ffffffffffffffff x13: ffff8000832b3a7d x12: 0000000000000008 [129.004021] x11: 0101010101010101 x10: ffff8000150cb560 x9: ffff80007b087c00 [129.004577] x8: ffff00009a509de0 x7: 0000000000000000 x6: 00000000be8c4ee3 [ 129.005026] x5: 0000000000000000 x4: 0000000000000000 x3: ffff000094d56680 [129.005425] x2: ffff80007b0637f8 x1: ffff000090075600 x0: 00009a509d00 [ 129.005824] Rastreo de llamadas: [ 129.005967] call_start+0x74/0x138 [sunrpc] [ 129.006233] __rpc_execute+0xb8/0x3e0 [sunrpc] [ 129.006506] rpc_execute+0x160/0x1d8 [sunrpc] [ 129.006778] run_task+0x148/0x1f8 [sunrpc] [ 129.007204] tls_probe+0x80/ 0xd0 [sunrpc] [ 129.007460] rpc_ping+0x28/0x80 [sunrpc] [ 129.007715] rpc_create_xprt+0x134/0x1a0 [sunrpc] [ 129.007999] rpc_create+0x128/0x2a0 [ 129.008264] xs_tcp_tls_setup_socket+0xdc/0x508 [sunrpc] [ 129.008583 ] Process_one_work+0x174/0x3c8 [ 129.008813] work_thread+0x2c8/0x3e0 [ 129.009033] kthread+0x100/0x110 [ 129.009225] ret_from_fork+0x10/0x20 [ 129.009432] C\\u00f3digo: ffffc2 911fe042 aa1403e1 aa1303e0 (b9401c83)\"}]",
      "id": "CVE-2024-36907",
      "lastModified": "2024-11-21T09:22:47.277",
      "published": "2024-05-30T16:15:14.223",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/024f7744bd09cb2a47a0a96b9c8ad08109de99cc\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/8e088a20dbe33919695a8082c0b32deb62d23b4a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/9b332c72299f2ac284ab3d7c0301969b933e4ca1\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/024f7744bd09cb2a47a0a96b9c8ad08109de99cc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/8e088a20dbe33919695a8082c0b32deb62d23b4a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/9b332c72299f2ac284ab3d7c0301969b933e4ca1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36907\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-30T16:15:14.223\",\"lastModified\":\"2025-05-26T11:15:19.720\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-26T10:27:27.681Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-36907\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"state\": \"REJECTED\", \"assignerShortName\": \"Linux\", \"dateReserved\": \"2024-05-30T15:25:07.067Z\", \"datePublished\": \"2024-05-30T15:29:07.193Z\", \"dateUpdated\": \"2025-05-26T10:27:27.681Z\", \"dateRejected\": \"2025-05-26T10:27:27.681Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…