Skip to main content

CVE-2024-26961: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26961cvecve-2024-26961
Published: Wed May 01 2024 (05/01/2024, 05:19:16 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mac802154: fix llsec key resources release in mac802154_llsec_key_del mac802154_llsec_key_del() can free resources of a key directly without following the RCU rules for waiting before the end of a grace period. This may lead to use-after-free in case llsec_lookup_key() is traversing the list of keys in parallel with a key deletion: refcount_t: addition on 0; use-after-free. WARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0 Modules linked in: CPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 RIP: 0010:refcount_warn_saturate+0x162/0x2a0 Call Trace: <TASK> llsec_lookup_key.isra.0+0x890/0x9e0 mac802154_llsec_encrypt+0x30c/0x9c0 ieee802154_subif_start_xmit+0x24/0x1e0 dev_hard_start_xmit+0x13e/0x690 sch_direct_xmit+0x2ae/0xbc0 __dev_queue_xmit+0x11dd/0x3c20 dgram_sendmsg+0x90b/0xd60 __sys_sendto+0x466/0x4c0 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x45/0xf0 entry_SYSCALL_64_after_hwframe+0x6e/0x76 Also, ieee802154_llsec_key_entry structures are not freed by mac802154_llsec_key_del(): unreferenced object 0xffff8880613b6980 (size 64): comm "iwpan", pid 2176, jiffies 4294761134 (age 60.475s) hex dump (first 32 bytes): 78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de x......."....... 00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00 ................ backtrace: [<ffffffff81dcfa62>] __kmem_cache_alloc_node+0x1e2/0x2d0 [<ffffffff81c43865>] kmalloc_trace+0x25/0xc0 [<ffffffff88968b09>] mac802154_llsec_key_add+0xac9/0xcf0 [<ffffffff8896e41a>] ieee802154_add_llsec_key+0x5a/0x80 [<ffffffff8892adc6>] nl802154_add_llsec_key+0x426/0x5b0 [<ffffffff86ff293e>] genl_family_rcv_msg_doit+0x1fe/0x2f0 [<ffffffff86ff46d1>] genl_rcv_msg+0x531/0x7d0 [<ffffffff86fee7a9>] netlink_rcv_skb+0x169/0x440 [<ffffffff86ff1d88>] genl_rcv+0x28/0x40 [<ffffffff86fec15c>] netlink_unicast+0x53c/0x820 [<ffffffff86fecd8b>] netlink_sendmsg+0x93b/0xe60 [<ffffffff86b91b35>] ____sys_sendmsg+0xac5/0xca0 [<ffffffff86b9c3dd>] ___sys_sendmsg+0x11d/0x1c0 [<ffffffff86b9c65a>] __sys_sendmsg+0xfa/0x1d0 [<ffffffff88eadbf5>] do_syscall_64+0x45/0xf0 [<ffffffff890000ea>] entry_SYSCALL_64_after_hwframe+0x6e/0x76 Handle the proper resource release in the RCU callback function mac802154_llsec_key_del_rcu(). Note that if llsec_lookup_key() finds a key, it gets a refcount via llsec_key_get() and locally copies key id from key_entry (which is a list element). So it's safe to call llsec_key_put() and free the list entry after the RCU grace period elapses. Found by Linux Verification Center (linuxtesting.org).

AI-Powered Analysis

AILast updated: 06/29/2025, 13:40:25 UTC

Technical Analysis

CVE-2024-26961 is a use-after-free vulnerability in the Linux kernel's mac802154 subsystem, which handles IEEE 802.15.4 wireless communication, commonly used in low-power wireless personal area networks (WPANs). The flaw arises in the mac802154_llsec_key_del() function responsible for deleting link-layer security (LLSEC) keys. This function improperly frees key resources without adhering to Read-Copy-Update (RCU) synchronization rules, specifically failing to wait for the RCU grace period before releasing memory. As a result, concurrent operations such as llsec_lookup_key(), which traverse the list of keys, may access freed memory, leading to use-after-free conditions. This can cause kernel warnings, crashes, or potentially arbitrary code execution in kernel context if exploited. Additionally, the vulnerability includes a resource leak where ieee802154_llsec_key_entry structures are not freed properly, compounding resource management issues. The root cause is improper reference counting and delayed freeing of key entries, which the patch addresses by moving resource release to an RCU callback function (mac802154_llsec_key_del_rcu()). This ensures safe memory reclamation after all readers have finished accessing the data. The vulnerability was discovered by the Linux Verification Center and affects Linux kernel versions prior to the fix, including the 6.7.0 kernel referenced. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-26961 depends largely on the deployment of Linux systems utilizing the mac802154 subsystem, which is specialized for IEEE 802.15.4 wireless communications. This technology is often used in industrial IoT, smart metering, building automation, and wireless sensor networks. Organizations in sectors such as manufacturing, utilities, smart cities, and critical infrastructure that rely on Linux-based embedded devices or gateways with 802.15.4 support could be at risk. Exploitation could lead to kernel crashes causing denial of service or, in worst cases, privilege escalation and arbitrary code execution within the kernel, compromising system integrity and confidentiality. Given the kernel-level nature of the flaw, successful exploitation could allow attackers to bypass security controls and gain persistent control over affected devices. This poses risks to operational continuity and data security, especially in environments where these wireless protocols are integral to system operations. However, the specialized nature of the affected subsystem limits the scope compared to more general Linux kernel vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

European organizations should prioritize patching Linux kernels to versions that include the fix for CVE-2024-26961. Specifically, updating to kernel versions released after the fix (post-6.7.0 or corresponding stable releases) is critical. For embedded or specialized devices where kernel upgrades are challenging, organizations should work with vendors to obtain patched firmware or kernel updates. Additionally, organizations should audit their environments to identify systems using IEEE 802.15.4 mac802154 drivers and assess exposure. Network segmentation and strict access controls should be enforced around devices using this technology to limit potential attack vectors. Monitoring kernel logs for refcount warnings or unusual crashes related to mac802154 can help detect attempted exploitation. Employing runtime security tools capable of detecting use-after-free or memory corruption in kernel space may provide early warning. Finally, organizations should review and harden wireless network configurations to reduce unauthorized access to WPAN devices, including strong authentication and encryption where supported.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.201Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2f53

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:40:25 PM

Last updated: 8/8/2025, 9:05:23 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats