CVE-2024-43835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
virtio_net: Fix napi_skb_cache_put warning<br />
<br />
After the commit bdacf3e34945 ("net: Use nested-BH locking for<br />
napi_alloc_cache.") was merged, the following warning began to appear:<br />
<br />
WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0<br />
<br />
__warn+0x12f/0x340<br />
napi_skb_cache_put+0x82/0x4b0<br />
napi_skb_cache_put+0x82/0x4b0<br />
report_bug+0x165/0x370<br />
handle_bug+0x3d/0x80<br />
exc_invalid_op+0x1a/0x50<br />
asm_exc_invalid_op+0x1a/0x20<br />
__free_old_xmit+0x1c8/0x510<br />
napi_skb_cache_put+0x82/0x4b0<br />
__free_old_xmit+0x1c8/0x510<br />
__free_old_xmit+0x1c8/0x510<br />
__pfx___free_old_xmit+0x10/0x10<br />
<br />
The issue arises because virtio is assuming it&#39;s running in NAPI context<br />
even when it&#39;s not, such as in the netpoll case.<br />
<br />
To resolve this, modify virtnet_poll_tx() to only set NAPI when budget<br />
is available. Same for virtnet_poll_cleantx(), which always assumed that<br />
it was in a NAPI context.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/468a729b78895893d0e580ceea49bed8ada2a2bd
- https://git.kernel.org/stable/c/6b5325f2457521bbece29499970c0117a648c620
- https://git.kernel.org/stable/c/842a97b5e44f0c8a9fc356fe976e0e13ddcf7783
- https://git.kernel.org/stable/c/cc7340f18e45886121c131227985d64ef666012f
- https://git.kernel.org/stable/c/d3af435e8ace119e58d8e21d3d2d6a4e7c4a4baa
- https://git.kernel.org/stable/c/f5e9a22d19bb98a7e86034db85eb295e94187caa
- https://git.kernel.org/stable/c/f8321fa75102246d7415a6af441872f6637c93ab
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



