CVE-2024-47734
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
23/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()<br />
<br />
syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce<br />
this[1], one bond device (bond1) has xdpdrv, which increases<br />
bpf_master_redirect_enabled_key. Another bond device (bond0) which is<br />
unsupported by XDP but its slave (veth3) has xdpgeneric that returns<br />
XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().<br />
To reduce unnecessary warnings and improve log management, we need to<br />
delete the WARN_ON_ONCE() and add ratelimit to the netdev_err().<br />
<br />
[1] Steps to reproduce:<br />
# Needs tx_xdp with return XDP_TX;<br />
ip l add veth0 type veth peer veth1<br />
ip l add veth3 type veth peer veth4<br />
ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP<br />
ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default<br />
ip l set veth0 master bond1<br />
ip l set bond1 up<br />
# Increases bpf_master_redirect_enabled_key<br />
ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx<br />
ip l set veth3 master bond0<br />
ip l set bond0 up<br />
ip l set veth4 up<br />
# Triggers WARN_ON_ONCE() from the xdp_master_redirect()<br />
ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.168 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c
- https://git.kernel.org/stable/c/57b5fba55c6f8b1d83312a34bd656166fcd95658
- https://git.kernel.org/stable/c/6b64197b4bf1a5703a8b105367baf20f1e627a75
- https://git.kernel.org/stable/c/72e2c0825a480e19ee999cee9d018850d38c82b9
- https://git.kernel.org/stable/c/c1be35e774f8ed415e01209fddd963c5a74e8e9f
- https://git.kernel.org/stable/c/ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8