We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-4454

can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate



Description

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate The conclusion "j1939_session_deactivate() should be called with a session ref-count of at least 2" is incorrect. In some concurrent scenarios, j1939_session_deactivate can be called with the session ref-count less than 2. But there is not any problem because it will check the session active state before session putting in j1939_session_deactivate_locked(). Here is the concurrent scenario of the problem reported by syzbot and my reproduction log. cpu0 cpu1 j1939_xtp_rx_eoma j1939_xtp_rx_abort_one j1939_session_get_by_addr [kref == 2] j1939_session_get_by_addr [kref == 3] j1939_session_deactivate [kref == 2] j1939_session_put [kref == 1] j1939_session_completed j1939_session_deactivate WARN_ON_ONCE(kref < 2) ===================================================== WARNING: CPU: 1 PID: 21 at net/can/j1939/transport.c:1088 j1939_session_deactivate+0x5f/0x70 CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 5.14.0-rc7+ #32 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014 RIP: 0010:j1939_session_deactivate+0x5f/0x70 Call Trace: j1939_session_deactivate_activate_next+0x11/0x28 j1939_xtp_rx_eoma+0x12a/0x180 j1939_tp_recv+0x4a2/0x510 j1939_can_recv+0x226/0x380 can_rcv_filter+0xf8/0x220 can_receive+0x102/0x220 ? process_backlog+0xf0/0x2c0 can_rcv+0x53/0xf0 __netif_receive_skb_one_core+0x67/0x90 ? process_backlog+0x97/0x2c0 __netif_receive_skb+0x22/0x80

Reserved 2025-02-26 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

7eef18c0479ba5d9f54fba30cd77c233ebca3eb1 before 6950df42a03c9ac9290503ced3f371199cb68fa9
affected

55dd22c5d029423f513fd849e633adf0e9c10d0c before b6d44072117bba057d50f7a2f96e5d070c65926d
affected

0c71437dd50dd687c15d8ca80b3b68f10bb21d63 before 9ab896775f98ff54b68512f345eed178bf961084
affected

0c71437dd50dd687c15d8ca80b3b68f10bb21d63 before 1740a1e45eee65099a92fb502e1e67e63aad277d
affected

0c71437dd50dd687c15d8ca80b3b68f10bb21d63 before d0553680f94c49bbe0e39eb50d033ba563b4212d
affected

5e1fc537c1be332aef9621ca9146aeb3ba59522f
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

5.4.232
unaffected

5.10.168
unaffected

5.15.93
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/6950df42a03c9ac9290503ced3f371199cb68fa9

git.kernel.org/...c/b6d44072117bba057d50f7a2f96e5d070c65926d

git.kernel.org/...c/9ab896775f98ff54b68512f345eed178bf961084

git.kernel.org/...c/1740a1e45eee65099a92fb502e1e67e63aad277d

git.kernel.org/...c/d0553680f94c49bbe0e39eb50d033ba563b4212d

cve.org (CVE-2021-4454)

nvd.nist.gov (CVE-2021-4454)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-4454

Support options

Helpdesk Chat, Email, Knowledgebase