![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-35892 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
qdisc_tree_reduce_backlog() is called with the qdisc lock held, not
RTNL. We must use qdisc_lookup_rcu() instead of qdisc_lookup() syzbot
reported: WARNING: suspicious RCU usage 6.1.74-syzkaller #0 Not
tainted ----------------------------- net/sched/sch_api.c:305
suspicious rcu_dereference_protected() usage! other info that might
help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks
held by udevd/1142: #0: ffffffff87c729a0 (rcu_read_lock){....}-{1:2},
at: rcu_lock_acquire include/linux/rcupdate.h:306 [inline] #0:
ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock
include/linux/rcupdate.h:747 [inline] #0: ffffffff87c729a0
(rcu_read_lock){....}-{1:2}, at: net_tx_action+0x64a/0x970
net/core/dev.c:5282 #1: ffff888171861108 (&sch->q.lock){+.-.}-{2:2},
at: spin_lock include/linux/spinlock.h:350 [inline] #1:
ffff888171861108 (&sch->q.lock){+.-.}-{2:2}, at:
net_tx_action+0x754/0x970 net/core/dev.c:5297 #2: ffffffff87c729a0
(rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire
include/linux/rcupdate.h:306 [inline] #2: ffffffff87c729a0
(rcu_read_lock){....}-{1:2}, at: rcu_read_lock
include/linux/rcupdate.h:747 [inline] #2: ffffffff87c729a0
(rcu_read_lock){....}-{1:2}, at: qdisc_tree_reduce_backlog+0x84/0x580
net/sched/sch_api.c:792 stack backtrace: CPU: 1 PID: 1142 Comm: udevd
Not tainted 6.1.74-syzkaller #0 Hardware name: Google Google Compute
Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace:
|
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-35892 https://git.kernel.org/stable/c/07696415526bee0607e495017369c7303a4792e1 https://git.kernel.org/stable/c/07696415526bee0607e495017369c7303a4792e1 https://git.kernel.org/stable/c/7eb322360b0266481e560d1807ee79e0cef5742b https://git.kernel.org/stable/c/7eb322360b0266481e560d1807ee79e0cef5742b https://git.kernel.org/stable/c/b7d1ce2cc7192e8a037faa3f5d3ba72c25976460 https://git.kernel.org/stable/c/b7d1ce2cc7192e8a037faa3f5d3ba72c25976460 https://git.kernel.org/stable/c/c040b99461a5bfc14c2d0cbb1780fcc3a4706c7e https://git.kernel.org/stable/c/c040b99461a5bfc14c2d0cbb1780fcc3a4706c7e |