First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave() syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce this[1], one bond device (bond1) has xdpdrv, which increases bpf_master_redirect_enabled_key. Another bond device (bond0) which is unsupported by XDP but its slave (veth3) has xdpgeneric that returns XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect(). To reduce unnecessary warnings and improve log management, we need to delete the WARN_ON_ONCE() and add ratelimit to the netdev_err(). [1] Steps to reproduce: # Needs tx_xdp with return XDP_TX; ip l add veth0 type veth peer veth1 ip l add veth3 type veth peer veth4 ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default ip l set veth0 master bond1 ip l set bond1 up # Increases bpf_master_redirect_enabled_key ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx ip l set veth3 master bond0 ip l set bond0 up ip l set veth4 up # Triggers WARN_ON_ONCE() from the xdp_master_redirect() ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=5.15<5.15.168 | |
Linux kernel | >=5.16<6.1.113 | |
Linux kernel | >=6.2<6.6.54 | |
Linux kernel | >=6.7<6.10.13 | |
Linux kernel | >=6.11<6.11.2 | |
Linux Kernel | >=5.15<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.54 | |
Linux Kernel | >=6.7<6.10.13 | |
Linux Kernel | >=6.11<6.11.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47734 has been resolved in the Linux kernel to prevent unnecessary warnings and logs.
To fix CVE-2024-47734, update to the corrected versions of the Linux kernel listed in the advisory.
CVE-2024-47734 affects multiple Linux kernel versions including those between 5.10 and 6.6.
Yes, a patch has been made available for CVE-2024-47734 in the latest stable Linux kernel updates.
While CVE-2024-47734 primarily results in unnecessary warnings, it is advisable to apply the fix to maintain optimal system performance.