CVE-2024-26707
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2024
Last modified:
17/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()<br />
<br />
Syzkaller reported [1] hitting a warning after failing to allocate<br />
resources for skb in hsr_init_skb(). Since a WARN_ONCE() call will<br />
not help much in this case, it might be prudent to switch to<br />
netdev_warn_once(). At the very least it will suppress syzkaller<br />
reports such as [1].<br />
<br />
Just in case, use netdev_warn_once() in send_prp_supervision_frame()<br />
for similar reasons.<br />
<br />
[1]<br />
HSR: Could not send supervision frame<br />
WARNING: CPU: 1 PID: 85 at net/hsr/hsr_device.c:294 send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294<br />
RIP: 0010:send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294<br />
...<br />
Call Trace:<br />
<br />
hsr_announce+0x114/0x370 net/hsr/hsr_device.c:382<br />
call_timer_fn+0x193/0x590 kernel/time/timer.c:1700<br />
expire_timers kernel/time/timer.c:1751 [inline]<br />
__run_timers+0x764/0xb20 kernel/time/timer.c:2022<br />
run_timer_softirq+0x58/0xd0 kernel/time/timer.c:2035<br />
__do_softirq+0x21a/0x8de kernel/softirq.c:553<br />
invoke_softirq kernel/softirq.c:427 [inline]<br />
__irq_exit_rcu kernel/softirq.c:632 [inline]<br />
irq_exit_rcu+0xb7/0x120 kernel/softirq.c:644<br />
sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1076<br />
<br />
<br />
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649<br />
...<br />
<br />
This issue is also found in older kernels (at least up to 5.10).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.210 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb
- https://git.kernel.org/stable/c/37e8c97e539015637cb920d3e6f1e404f707a06e
- https://git.kernel.org/stable/c/547545e50c913861219947ce490c68a1776b9b51
- https://git.kernel.org/stable/c/56440799fc4621c279df16176f83a995d056023a
- https://git.kernel.org/stable/c/923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8
- https://git.kernel.org/stable/c/de769423b2f053182a41317c4db5a927e90622a0
- https://git.kernel.org/stable/c/0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb
- https://git.kernel.org/stable/c/37e8c97e539015637cb920d3e6f1e404f707a06e
- https://git.kernel.org/stable/c/547545e50c913861219947ce490c68a1776b9b51
- https://git.kernel.org/stable/c/56440799fc4621c279df16176f83a995d056023a
- https://git.kernel.org/stable/c/923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8
- https://git.kernel.org/stable/c/de769423b2f053182a41317c4db5a927e90622a0
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



