]
__kmem_cache_alloc_node+0x1e2/0x2d0 []
kmalloc_trace+0x25/0xc0 []
mac802154_llsec_key_add+0xac9/0xcf0 []
ieee802154_add_llsec_key+0x5a/0x80 []
nl802154_add_llsec_key+0x426/0x5b0 []
genl_family_rcv_msg_doit+0x1fe/0x2f0 []
genl_rcv_msg+0x531/0x7d0 []
netlink_rcv_skb+0x169/0x440 [] genl_rcv+0x28/0x40
[] netlink_unicast+0x53c/0x820 []
netlink_sendmsg+0x93b/0xe60 []
____sys_sendmsg+0xac5/0xca0 []
___sys_sendmsg+0x11d/0x1c0 []
__sys_sendmsg+0xfa/0x1d0 [] do_syscall_64+0x45/0xf0
[] entry_SYSCALL_64_after_hwframe+0x6e/0x76 Handle
the proper resource release in the RCU callback function
mac802154_llsec_key_del_rcu(). Note that if llsec_lookup_key() finds a
key, it gets a refcount via llsec_key_get() and locally copies key id
from key_entry (which is a list element). So it's safe to call
llsec_key_put() and free the list entry after the RCU grace period
elapses. Found by Linux Verification Center (linuxtesting.org).
">
]
__kmem_cache_alloc_node+0x1e2/0x2d0,[]
kmalloc_trace+0x25/0xc0,[]
mac802154_llsec_key_add+0xac9/0xcf0,[]
ieee802154_add_llsec_key+0x5a/0x80,[]
nl802154_add_llsec_key+0x426/0x5b0,[]
genl_family_rcv_msg_doit+0x1fe/0x2f0,[]
genl_rcv_msg+0x531/0x7d0,[]
netlink_rcv_skb+0x169/0x440,[],genl_rcv+0x28/0x40
[],netlink_unicast+0x53c/0x820,[]
netlink_sendmsg+0x93b/0xe60,[]
____sys_sendmsg+0xac5/0xca0,[]
___sys_sendmsg+0x11d/0x1c0,[]
__sys_sendmsg+0xfa/0x1d0,[],do_syscall_64+0x45/0xf0
[],entry_SYSCALL_64_after_hwframe+0x6e/0x76,Handle
the,proper,resource,release,in,the,RCU,callback,function
mac802154_llsec_key_del_rcu().,Note,that,if,llsec_lookup_key(),finds,a
key,,it,gets,a,refcount,via,llsec_key_get(),and,locally,copies,key,id
from,key_entry,(which,is,a,list,element).,So,it's,safe,to,call
llsec_key_put(),and,free,the,list,entry,after,the,RCU,grace,period
elapses.,Found,by,Linux,Verification,Center,(linuxtesting.org).
">
SecuritySpace - CVE-2024-26961
▼
|
 |
Bookkeeping Online ▼
Home
Free Trial
FAQ
Open/Create Company File
Accept an Invite
Order/Renew
|
|
© 1998-2025 E-Soft Inc. All rights reserved.