CVE-2023-54236
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
31/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/net_failover: fix txq exceeding warning<br />
<br />
The failover txq is inited as 16 queues.<br />
when a packet is transmitted from the failover device firstly,<br />
the failover device will select the queue which is returned from<br />
the primary device if the primary device is UP and running.<br />
If the primary device txq is bigger than the default 16,<br />
it can lead to the following warning:<br />
eth0 selects TX queue 18, but real number of TX queues is 16<br />
<br />
The warning backtrace is:<br />
[ 32.146376] CPU: 18 PID: 9134 Comm: chronyd Tainted: G E 6.2.8-1.el7.centos.x86_64 #1<br />
[ 32.147175] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014<br />
[ 32.147730] Call Trace:<br />
[ 32.147971] <br />
[ 32.148183] dump_stack_lvl+0x48/0x70<br />
[ 32.148514] dump_stack+0x10/0x20<br />
[ 32.148820] netdev_core_pick_tx+0xb1/0xe0<br />
[ 32.149180] __dev_queue_xmit+0x529/0xcf0<br />
[ 32.149533] ? __check_object_size.part.0+0x21c/0x2c0<br />
[ 32.149967] ip_finish_output2+0x278/0x560<br />
[ 32.150327] __ip_finish_output+0x1fe/0x2f0<br />
[ 32.150690] ip_finish_output+0x2a/0xd0<br />
[ 32.151032] ip_output+0x7a/0x110<br />
[ 32.151337] ? __pfx_ip_finish_output+0x10/0x10<br />
[ 32.151733] ip_local_out+0x5e/0x70<br />
[ 32.152054] ip_send_skb+0x19/0x50<br />
[ 32.152366] udp_send_skb.isra.0+0x163/0x3a0<br />
[ 32.152736] udp_sendmsg+0xba8/0xec0<br />
[ 32.153060] ? __folio_memcg_unlock+0x25/0x60<br />
[ 32.153445] ? __pfx_ip_generic_getfrag+0x10/0x10<br />
[ 32.153854] ? sock_has_perm+0x85/0xa0<br />
[ 32.154190] inet_sendmsg+0x6d/0x80<br />
[ 32.154508] ? inet_sendmsg+0x6d/0x80<br />
[ 32.154838] sock_sendmsg+0x62/0x70<br />
[ 32.155152] ____sys_sendmsg+0x134/0x290<br />
[ 32.155499] ___sys_sendmsg+0x81/0xc0<br />
[ 32.155828] ? _get_random_bytes.part.0+0x79/0x1a0<br />
[ 32.156240] ? ip4_datagram_release_cb+0x5f/0x1e0<br />
[ 32.156649] ? get_random_u16+0x69/0xf0<br />
[ 32.156989] ? __fget_light+0xcf/0x110<br />
[ 32.157326] __sys_sendmmsg+0xc4/0x210<br />
[ 32.157657] ? __sys_connect+0xb7/0xe0<br />
[ 32.157995] ? __audit_syscall_entry+0xce/0x140<br />
[ 32.158388] ? syscall_trace_enter.isra.0+0x12c/0x1a0<br />
[ 32.158820] __x64_sys_sendmmsg+0x24/0x30<br />
[ 32.159171] do_syscall_64+0x38/0x90<br />
[ 32.159493] entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
Fix that by reducing txq number as the non-existent primary-dev does.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/105cc268328231d5c2bfcbd03f265cec444a3492
- https://git.kernel.org/stable/c/2d5cebf57296f0189a61482035ad420384eedead
- https://git.kernel.org/stable/c/44d250c22209c680f61befbc2ac326da5452da01
- https://git.kernel.org/stable/c/c942f5cd63b7c2e73fe06744185a34b03267595b
- https://git.kernel.org/stable/c/e3cbdcb0fbb61045ef3ce0e072927cc41737f787
- https://git.kernel.org/stable/c/f032e125149d914e542548c17ebd613851031368



