CVE-2024-40942

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects The hwmp code use objects of type mesh_preq_queue, added to a list in ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath gets deleted, ex mesh interface is removed, the entries in that list will never get cleaned. Fix this by flushing all corresponding items of the preq_queue in mesh_path_flush_pending(). This should take care of KASAN reports like this: unreferenced object 0xffff00000668d800 (size 128): comm "kworker/u8:4", pid 67, jiffies 4295419552 (age 1836.444s) hex dump (first 32 bytes): 00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff ..........h..... 8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00 ....>........... backtrace: [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c [<00000000049bd418>] kmalloc_trace+0x34/0x80 [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8 [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4 [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764 [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4 [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440 [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4 [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508 [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c [<00000000b36425d1>] worker_thread+0x9c/0x634 [<0000000005852dd5>] kthread+0x1bc/0x1c4 [<000000005fccd770>] ret_from_fork+0x10/0x20 unreferenced object 0xffff000009051f00 (size 128): comm "kworker/u8:4", pid 67, jiffies 4295419553 (age 1836.440s) hex dump (first 32 bytes): 90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff ..........h..... 36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff 6'.......Xy..... backtrace: [<000000007302a0b6>] __kmem_cache_alloc_node+0x1e0/0x35c [<00000000049bd418>] kmalloc_trace+0x34/0x80 [<0000000000d792bb>] mesh_queue_preq+0x44/0x2a8 [<00000000c99c3696>] mesh_nexthop_resolve+0x198/0x19c [<00000000926bf598>] ieee80211_xmit+0x1d0/0x1f4 [<00000000fc8c2284>] __ieee80211_subif_start_xmit+0x30c/0x764 [<000000005926ee38>] ieee80211_subif_start_xmit+0x9c/0x7a4 [<000000004c86e916>] dev_hard_start_xmit+0x174/0x440 [<0000000023495647>] __dev_queue_xmit+0xe24/0x111c [<00000000cfe9ca78>] batadv_send_skb_packet+0x180/0x1e4 [<000000007bacc5d5>] batadv_v_elp_periodic_work+0x2f4/0x508 [<00000000adc3cd94>] process_one_work+0x4b8/0xa1c [<00000000b36425d1>] worker_thread+0x9c/0x634 [<0000000005852dd5>] kthread+0x1bc/0x1c4 [<000000005fccd770>] ret_from_fork+0x10/0x20
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

17 Sep 2025, 15:01

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/377dbb220edc8421b7960691876c5b3bef62f89b - () https://git.kernel.org/stable/c/377dbb220edc8421b7960691876c5b3bef62f89b - Patch
References () https://git.kernel.org/stable/c/617dadbfb2d3e152c5753e28356d189c9d6f33c0 - () https://git.kernel.org/stable/c/617dadbfb2d3e152c5753e28356d189c9d6f33c0 - Patch
References () https://git.kernel.org/stable/c/63d5f89bb5664d60edbf8cf0df911aaae8ed96a4 - () https://git.kernel.org/stable/c/63d5f89bb5664d60edbf8cf0df911aaae8ed96a4 - Patch
References () https://git.kernel.org/stable/c/7518e20a189f8659b8b83969db4d33a4068fcfc3 - () https://git.kernel.org/stable/c/7518e20a189f8659b8b83969db4d33a4068fcfc3 - Patch
References () https://git.kernel.org/stable/c/b7d7f11a291830fdf69d3301075dd0fb347ced84 - () https://git.kernel.org/stable/c/b7d7f11a291830fdf69d3301075dd0fb347ced84 - Patch
References () https://git.kernel.org/stable/c/c4c865f971fd4a255208f57ef04d814c2ae9e0dc - () https://git.kernel.org/stable/c/c4c865f971fd4a255208f57ef04d814c2ae9e0dc - Patch
References () https://git.kernel.org/stable/c/d81e244af521de63ad2883e17571b789c39b6549 - () https://git.kernel.org/stable/c/d81e244af521de63ad2883e17571b789c39b6549 - Patch
References () https://git.kernel.org/stable/c/ec79670eae430b3ffb7e0a6417ad7657728b8f95 - () https://git.kernel.org/stable/c/ec79670eae430b3ffb7e0a6417ad7657728b8f95 - Patch
CWE CWE-401
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/377dbb220edc8421b7960691876c5b3bef62f89b - () https://git.kernel.org/stable/c/377dbb220edc8421b7960691876c5b3bef62f89b -
References () https://git.kernel.org/stable/c/617dadbfb2d3e152c5753e28356d189c9d6f33c0 - () https://git.kernel.org/stable/c/617dadbfb2d3e152c5753e28356d189c9d6f33c0 -
References () https://git.kernel.org/stable/c/63d5f89bb5664d60edbf8cf0df911aaae8ed96a4 - () https://git.kernel.org/stable/c/63d5f89bb5664d60edbf8cf0df911aaae8ed96a4 -
References () https://git.kernel.org/stable/c/7518e20a189f8659b8b83969db4d33a4068fcfc3 - () https://git.kernel.org/stable/c/7518e20a189f8659b8b83969db4d33a4068fcfc3 -
References () https://git.kernel.org/stable/c/b7d7f11a291830fdf69d3301075dd0fb347ced84 - () https://git.kernel.org/stable/c/b7d7f11a291830fdf69d3301075dd0fb347ced84 -
References () https://git.kernel.org/stable/c/c4c865f971fd4a255208f57ef04d814c2ae9e0dc - () https://git.kernel.org/stable/c/c4c865f971fd4a255208f57ef04d814c2ae9e0dc -
References () https://git.kernel.org/stable/c/d81e244af521de63ad2883e17571b789c39b6549 - () https://git.kernel.org/stable/c/d81e244af521de63ad2883e17571b789c39b6549 -
References () https://git.kernel.org/stable/c/ec79670eae430b3ffb7e0a6417ad7657728b8f95 - () https://git.kernel.org/stable/c/ec79670eae430b3ffb7e0a6417ad7657728b8f95 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: wifi: mac80211: mesh: corrige la fuga de objetos mesh_preq_queue El código hwmp usa objetos de tipo mesh_preq_queue, agregados a una lista en ieee80211_if_mesh, para realizar un seguimiento del mpath que necesitamos resolver. Si se elimina mpath, se elimina la interfaz ex mesh, las entradas en esa lista nunca se limpiarán. Solucione este problema eliminando todos los elementos correspondientes de preq_queue en mesh_path_flush_pending(). Esto debería encargarse de informes KASAN como este: objeto sin referencia 0xffff00000668d800 (tamaño 128): comm "kworker/u8:4", pid 67, jiffies 4295419552 (edad 1836.444s) volcado hexadecimal (primeros 32 bytes): 00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff ..........h..... 8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00 ....&gt;.. ......... retroceso: [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80 [&lt;0000000000d792bb&gt;] 8 [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/ 0x19c [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4 [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764 [&lt;000000005926ee38&gt;] 11_subif_start_xmit+0x9c/0x7a4 [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440 [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/ 0x111c [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4 [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508 [&lt;00000000adc3cd94&gt;] xa1c [&lt;00000000b36425d1&gt;] hilo_trabajador+0x9c/0x634 [&lt;0000000005852dd5&gt;] kthread+0x1bc/ 0x1c4 [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffff000009051f00 (tamaño 128): comm "kworker/u8:4", pid 67, jiffies 4295419553 (edad 1836.440s) volcado hexadecimal (primero 32 bytes): 90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff ..........h..... 36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff 6'.... ...Xy..... retroceso: [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80 [&lt;0000000000d792bb&gt;] 0x2a8 [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/ 0x19c [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4 [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764 [&lt;000000005926ee38&gt;] 11_subif_start_xmit+0x9c/0x7a4 [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440 [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/ 0x111c [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4 [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508 [&lt;00000000adc3cd94&gt;] xa1c [&lt;00000000b36425d1&gt;] hilo_trabajador+0x9c/0x634 [&lt;0000000005852dd5&gt;] kthread+0x1bc/ 0x1c4 [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40942

Mitre link : CVE-2024-40942

CVE.ORG link : CVE-2024-40942


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime