CVE-2024-41005

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
12/07/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netpoll: Fix race condition in netpoll_owner_active<br /> <br /> KCSAN detected a race condition in netpoll:<br /> <br /> BUG: KCSAN: data-race in net_rx_action / netpoll_send_skb<br /> write (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:<br /> net_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)<br /> <br /> read to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:<br /> netpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)<br /> netpoll_send_udp (net/core/netpoll.c:?)<br /> <br /> value changed: 0x0000000a -&gt; 0xffffffff<br /> <br /> This happens because netpoll_owner_active() needs to check if the<br /> current CPU is the owner of the lock, touching napi-&gt;poll_owner<br /> non atomically. The -&gt;poll_owner field contains the current CPU holding<br /> the lock.<br /> <br /> Use an atomic read to check if the poll owner is the current CPU.

Impact