• CVE-2024-40942

发布时间: 2024年8月2日

修改时间: 2025年1月24日

概要

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned. Fix this by flushing all corresponding items of the preq_queue in mesh_path_flush_pending(). This should take care of KASAN reports like this: unreferenced object 0xffff00000668d800 (size 128): comm "kworker/u8:4", pid 67, jiffies 4295419552 (age 1836.444s) hex dump (first 32 bytes): 00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff ..........h..... 8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00 ....&gt;........... backtrace: [<000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c [<00000000049bd418&gt;] kmalloc_trace+0x34/0x80 [<0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8 [<00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c [<00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4 [<00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764 [<000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4 [<000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440 [<0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c [<00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4 [<000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508 [<00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c [<00000000b36425d1&gt;] worker_thread+0x9c/0x634 [<0000000005852dd5&gt;] kthread+0x1bc/0x1c4 [<000000005fccd770&gt;] ret_from_fork+0x10/0x20 unreferenced object 0xffff000009051f00 (size 128): comm "kworker/u8:4", pid 67, jiffies 4295419553 (age 1836.440s) hex dump (first 32 bytes): 90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff ..........h..... 36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff 6'.......Xy..... backtrace: [<000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c [<00000000049bd418&gt;] kmalloc_trace+0x34/0x80 [<0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8 [<00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c [<00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4 [<00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764 [<000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4 [<000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440 [<0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c [<00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4 [<000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508 [<00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c [<00000000b36425d1&gt;] worker_thread+0x9c/0x634 [<0000000005852dd5&gt;] kthread+0x1bc/0x1c4 [<000000005fccd770&gt;] ret_from_fork+0x10/0x20

CVSS v3 指标

NVD openEuler
Confidentiality Low
Attack Vector Local
CVSS评分 N/A 3.9
Attack Complexity High
Privileges Required High
Scope Unchanged
Integrity Low
User Interaction None
Availability Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3561 kernel security update 2024年8月16日
KylinSec-SA-2024-4821 kernel security update 2024年8月2日

影响产品

产品 状态
KY3.4-5A kernel Fixed
KY3.5.2 kernel Fixed
V6 kernel Fixed