]
__kmem_cache_alloc_node+0x1e8/0x320 []
__kmalloc+0x4e/0x90 []
mlxsw_sp_acl_ruleset_get+0x34d/0x7a0 []
mlxsw_sp_flower_tmplt_create+0x145/0x180 []
mlxsw_sp_flow_block_cb+0x1ea/0x280 []
tc_setup_cb_call+0x183/0x340 []
fl_tmplt_create+0x3da/0x4c0 []
tc_ctl_chain+0xa15/0x1170 []
rtnetlink_rcv_msg+0x3cc/0xed0 []
netlink_rcv_skb+0x170/0x440 []
netlink_unicast+0x540/0x820 []
netlink_sendmsg+0x8d8/0xda0 []
____sys_sendmsg+0x30f/0xa80 []
___sys_sendmsg+0x13a/0x1e0 []
__sys_sendmsg+0x11c/0x1f0 [] do_syscall_64+0x40/0xe0
unreferenced object 0xffff88816d2c0400 (size 1024): comm "tc", pid
1079, jiffies 4294958525 (age 3074.287s) hex dump (first 32 bytes): 40
00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00 @.......W.8..... 10 04 2c
6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff ..,m......,m.... backtrace:
[] __kmem_cache_alloc_node+0x1e8/0x320
[] __kmalloc_node+0x51/0x90 []
kvmalloc_node+0xa6/0x1f0 []
bucket_table_alloc.isra.0+0x83/0x460 []
rhashtable_init+0x43b/0x7c0 []
mlxsw_sp_acl_ruleset_get+0x428/0x7a0 []
mlxsw_sp_flower_tmplt_create+0x145/0x180 []
mlxsw_sp_flow_block_cb+0x1ea/0x280 []
tc_setup_cb_call+0x183/0x340 []
fl_tmplt_create+0x3da/0x4c0 []
tc_ctl_chain+0xa15/0x1170 []
rtnetlink_rcv_msg+0x3cc/0xed0 []
netlink_rcv_skb+0x170/0x440 []
netlink_unicast+0x540/0x820 []
netlink_sendmsg+0x8d8/0xda0 []
____sys_sendmsg+0x30f/0xa80 [2] # tc qdisc add dev swp1 clsact # tc
chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32 #
tc qdisc del dev ---truncated---
">
]
__kmem_cache_alloc_node+0x1e8/0x320,[]
__kmalloc+0x4e/0x90,[]
mlxsw_sp_acl_ruleset_get+0x34d/0x7a0,[]
mlxsw_sp_flower_tmplt_create+0x145/0x180,[]
mlxsw_sp_flow_block_cb+0x1ea/0x280,[]
tc_setup_cb_call+0x183/0x340,[]
fl_tmplt_create+0x3da/0x4c0,[]
tc_ctl_chain+0xa15/0x1170,[]
rtnetlink_rcv_msg+0x3cc/0xed0,[]
netlink_rcv_skb+0x170/0x440,[]
netlink_unicast+0x540/0x820,[]
netlink_sendmsg+0x8d8/0xda0,[]
____sys_sendmsg+0x30f/0xa80,[]
___sys_sendmsg+0x13a/0x1e0,[]
__sys_sendmsg+0x11c/0x1f0,[],do_syscall_64+0x40/0xe0
unreferenced,object,0xffff88816d2c0400,(size,1024):,comm,"tc",,pid
1079,,jiffies,4294958525,(age,3074.287s),hex,dump,(first,32,bytes):,40
00,00,00,00,00,00,00,57,f6,38,be,00,00,00,00,@.......W.8.....,10,04,2c
6d,81,88,ff,ff,10,04,2c,6d,81,88,ff,ff,..,m......,m....,backtrace:
[],__kmem_cache_alloc_node+0x1e8/0x320
[],__kmalloc_node+0x51/0x90,[]
kvmalloc_node+0xa6/0x1f0,[]
bucket_table_alloc.isra.0+0x83/0x460,[]
rhashtable_init+0x43b/0x7c0,[]
mlxsw_sp_acl_ruleset_get+0x428/0x7a0,[]
mlxsw_sp_flower_tmplt_create+0x145/0x180,[]
mlxsw_sp_flow_block_cb+0x1ea/0x280,[]
tc_setup_cb_call+0x183/0x340,[]
fl_tmplt_create+0x3da/0x4c0,[]
tc_ctl_chain+0xa15/0x1170,[]
rtnetlink_rcv_msg+0x3cc/0xed0,[]
netlink_rcv_skb+0x170/0x440,[]
netlink_unicast+0x540/0x820,[]
netlink_sendmsg+0x8d8/0xda0,[]
____sys_sendmsg+0x30f/0xa80,[2],#,tc,qdisc,add,dev,swp1,clsact,#,tc
chain,add,dev,swp1,ingress,proto,ip,chain,1,flower,dst_ip,0.0.0.0/32,#
tc,qdisc,del,dev,---truncated---
">
SecuritySpace - CVE-2024-26669
▼
|
 |
Bookkeeping Online ▼
Home
Free Trial
FAQ
Open/Create Company File
Accept an Invite
Order/Renew
|
|
CVE ID: | CVE-2024-26669 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/sched: flower: Fix chain template offload When a qdisc is deleted
from a net device the stack instructs the underlying driver to remove
its flow offload callback from the associated filter block using the
'FLOW_BLOCK_UNBIND' command. The stack then continues to replay the
removal of the filters in the block for this driver by iterating over
the chains in the block and invoking the 'reoffload' operation of the
classifier being used. In turn, the classifier in its 'reoffload'
operation prepares and emits a 'FLOW_CLS_DESTROY' command for each
filter. However, the stack does not do the same for chain templates
and the underlying driver never receives a 'FLOW_CLS_TMPLT_DESTROY'
command when a qdisc is deleted. This results in a memory leak [1]
which can be reproduced using [2]. Fix by introducing a
'tmplt_reoffload' operation and have the stack invoke it with the
appropriate arguments as part of the replay. Implement the operation
in the sole classifier that supports chain templates (flower) by
emitting the 'FLOW_CLS_TMPLT_{CREATE,DESTROY}' command based on
whether a flow offload callback is being bound to a filter block or
being unbound from one. As far as I can tell, the issue happens since
cited commit which reordered tcf_block_offload_unbind() before
tcf_block_flush_all_chains() in __tcf_block_put(). The order cannot be
reversed as the filter block is expected to be freed after flushing
all the chains. [1] unreferenced object 0xffff888107e28800 (size
2048): comm "tc", pid 1079, jiffies 4294958525 (age 3074.287s) hex
dump (first 32 bytes): b1 a6 7c 11 81 88 ff ff e0 5b b3 10 81 88 ff ff
..|......[...... 01 00 00 00 00 00 00 00 e0 aa b0 84 ff ff ff ff
................ backtrace: []
__kmem_cache_alloc_node+0x1e8/0x320 []
__kmalloc+0x4e/0x90 []
mlxsw_sp_acl_ruleset_get+0x34d/0x7a0 []
mlxsw_sp_flower_tmplt_create+0x145/0x180 []
mlxsw_sp_flow_block_cb+0x1ea/0x280 []
tc_setup_cb_call+0x183/0x340 []
fl_tmplt_create+0x3da/0x4c0 []
tc_ctl_chain+0xa15/0x1170 []
rtnetlink_rcv_msg+0x3cc/0xed0 []
netlink_rcv_skb+0x170/0x440 []
netlink_unicast+0x540/0x820 []
netlink_sendmsg+0x8d8/0xda0 []
____sys_sendmsg+0x30f/0xa80 []
___sys_sendmsg+0x13a/0x1e0 []
__sys_sendmsg+0x11c/0x1f0 [] do_syscall_64+0x40/0xe0
unreferenced object 0xffff88816d2c0400 (size 1024): comm "tc", pid
1079, jiffies 4294958525 (age 3074.287s) hex dump (first 32 bytes): 40
00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00 @.......W.8..... 10 04 2c
6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff ..,m......,m.... backtrace:
[] __kmem_cache_alloc_node+0x1e8/0x320
[] __kmalloc_node+0x51/0x90 []
kvmalloc_node+0xa6/0x1f0 []
bucket_table_alloc.isra.0+0x83/0x460 []
rhashtable_init+0x43b/0x7c0 []
mlxsw_sp_acl_ruleset_get+0x428/0x7a0 []
mlxsw_sp_flower_tmplt_create+0x145/0x180 []
mlxsw_sp_flow_block_cb+0x1ea/0x280 []
tc_setup_cb_call+0x183/0x340 []
fl_tmplt_create+0x3da/0x4c0 []
tc_ctl_chain+0xa15/0x1170 []
rtnetlink_rcv_msg+0x3cc/0xed0 []
netlink_rcv_skb+0x170/0x440 []
netlink_unicast+0x540/0x820 []
netlink_sendmsg+0x8d8/0xda0 []
____sys_sendmsg+0x30f/0xa80 [2] # tc qdisc add dev swp1 clsact # tc
chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32 #
tc qdisc del dev ---truncated---
|
Test IDs: |
None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26669
https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8
https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8
https://git.kernel.org/stable/c/9ed46144cff3598a5cf79955630e795ff9af5b97
https://git.kernel.org/stable/c/9ed46144cff3598a5cf79955630e795ff9af5b97
https://git.kernel.org/stable/c/c04709b2cc99ae31c346f79f0211752d7b74df01
https://git.kernel.org/stable/c/c04709b2cc99ae31c346f79f0211752d7b74df01
|
© 1998-2025 E-Soft Inc. All rights reserved.