CVE-2024-56703
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv6: Fix soft lockups in fib6_select_path under high next hop churn<br />
<br />
Soft lockups have been observed on a cluster of Linux-based edge routers<br />
located in a highly dynamic environment. Using the `bird` service, these<br />
routers continuously update BGP-advertised routes due to frequently<br />
changing nexthop destinations, while also managing significant IPv6<br />
traffic. The lockups occur during the traversal of the multipath<br />
circular linked-list in the `fib6_select_path` function, particularly<br />
while iterating through the siblings in the list. The issue typically<br />
arises when the nodes of the linked list are unexpectedly deleted<br />
concurrently on a different core—indicated by their &#39;next&#39; and<br />
&#39;previous&#39; elements pointing back to the node itself and their reference<br />
count dropping to zero. This results in an infinite loop, leading to a<br />
soft lockup that triggers a system panic via the watchdog timer.<br />
<br />
Apply RCU primitives in the problematic code sections to resolve the<br />
issue. Where necessary, update the references to fib6_siblings to<br />
annotate or use the RCU APIs.<br />
<br />
Include a test script that reproduces the issue. The script<br />
periodically updates the routing table while generating a heavy load<br />
of outgoing IPv6 traffic through multiple iperf3 clients. It<br />
consistently induces infinite soft lockups within a couple of minutes.<br />
<br />
Kernel log:<br />
<br />
0 [ffffbd13003e8d30] machine_kexec at ffffffff8ceaf3eb<br />
1 [ffffbd13003e8d90] __crash_kexec at ffffffff8d0120e3<br />
2 [ffffbd13003e8e58] panic at ffffffff8cef65d4<br />
3 [ffffbd13003e8ed8] watchdog_timer_fn at ffffffff8d05cb03<br />
4 [ffffbd13003e8f08] __hrtimer_run_queues at ffffffff8cfec62f<br />
5 [ffffbd13003e8f70] hrtimer_interrupt at ffffffff8cfed756<br />
6 [ffffbd13003e8fd0] __sysvec_apic_timer_interrupt at ffffffff8cea01af<br />
7 [ffffbd13003e8ff0] sysvec_apic_timer_interrupt at ffffffff8df1b83d<br />
-- --<br />
8 [ffffbd13003d3708] asm_sysvec_apic_timer_interrupt at ffffffff8e000ecb<br />
[exception RIP: fib6_select_path+299]<br />
RIP: ffffffff8ddafe7b RSP: ffffbd13003d37b8 RFLAGS: 00000287<br />
RAX: ffff975850b43600 RBX: ffff975850b40200 RCX: 0000000000000000<br />
RDX: 000000003fffffff RSI: 0000000051d383e4 RDI: ffff975850b43618<br />
RBP: ffffbd13003d3800 R8: 0000000000000000 R9: ffff975850b40200<br />
R10: 0000000000000000 R11: 0000000000000000 R12: ffffbd13003d3830<br />
R13: ffff975850b436a8 R14: ffff975850b43600 R15: 0000000000000007<br />
ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018<br />
9 [ffffbd13003d3808] ip6_pol_route at ffffffff8ddb030c<br />
10 [ffffbd13003d3888] ip6_pol_route_input at ffffffff8ddb068c<br />
11 [ffffbd13003d3898] fib6_rule_lookup at ffffffff8ddf02b5<br />
12 [ffffbd13003d3928] ip6_route_input at ffffffff8ddb0f47<br />
13 [ffffbd13003d3a18] ip6_rcv_finish_core.constprop.0 at ffffffff8dd950d0<br />
14 [ffffbd13003d3a30] ip6_list_rcv_finish.constprop.0 at ffffffff8dd96274<br />
15 [ffffbd13003d3a98] ip6_sublist_rcv at ffffffff8dd96474<br />
16 [ffffbd13003d3af8] ipv6_list_rcv at ffffffff8dd96615<br />
17 [ffffbd13003d3b60] __netif_receive_skb_list_core at ffffffff8dc16fec<br />
18 [ffffbd13003d3be0] netif_receive_skb_list_internal at ffffffff8dc176b3<br />
19 [ffffbd13003d3c50] napi_gro_receive at ffffffff8dc565b9<br />
20 [ffffbd13003d3c80] ice_receive_skb at ffffffffc087e4f5 [ice]<br />
21 [ffffbd13003d3c90] ice_clean_rx_irq at ffffffffc0881b80 [ice]<br />
22 [ffffbd13003d3d20] ice_napi_poll at ffffffffc088232f [ice]<br />
23 [ffffbd13003d3d80] __napi_poll at ffffffff8dc18000<br />
24 [ffffbd13003d3db8] net_rx_action at ffffffff8dc18581<br />
25 [ffffbd13003d3e40] __do_softirq at ffffffff8df352e9<br />
26 [ffffbd13003d3eb0] run_ksoftirqd at ffffffff8ceffe47<br />
27 [ffffbd13003d3ec0] smpboot_thread_fn at ffffffff8cf36a30<br />
28 [ffffbd13003d3ee8] kthread at ffffffff8cf2b39f<br />
29 [ffffbd13003d3f28] ret_from_fork at ffffffff8ce5fa64<br />
30 [ffffbd13003d3f50] ret_from_fork_asm at ffffffff8ce03cbb
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 6.1.128 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/11edcd026012ac18acee0f1514db3ed1b160fc6f
- https://git.kernel.org/stable/c/34a949e7a0869dfa31a40416d2a56973fae1807b
- https://git.kernel.org/stable/c/52da02521ede55fb86546c3fffd9377b3261b91f
- https://git.kernel.org/stable/c/d0ec61c9f3583b76aebdbb271f5c0d3fcccd48b2
- https://git.kernel.org/stable/c/d9ccb18f83ea2bb654289b6ecf014fd267cc988b
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



