0b eb b1 e8 5c
09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb RSP:
0018:ffffc9000c6d7ce0 EFLAGS: 00010286 RAX: 0000000000000000 RBX:
ffff8880422b8b00 RCX: ffffffff8110503c RDX: ffff888030652f00 RSI:
ffffffff81105045 RDI: 0000000000000001 RBP: 0000000000000000 R08:
0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11:
ffffffff81bb62cb R12: ffffffff84807ffc R13: ffff88804ad6fcc0 R14:
ffffffff84807ffc R15: ffffffff85741ff8 FS: 00007f30cfba8640(0000)
GS:ffff88807dd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES:
0000 CR0: 0000000080050033 CR2: 00007ff51afe8000 CR3: 000000005a60a005
CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400 PKRU: 55555554 Call Trace:
![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-36939 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
nfs: Handle error of rpc_proc_register() in nfs_net_init(). syzkaller
reported a warning [0] triggered while destroying immature netns.
rpc_proc_register() was called in init_nfs_fs(), but its error has
been ignored since at least the initial commit 1da177e4c3f4
("Linux-2.6.12-rc2"). Recently, commit d47151b79e32 ("nfs: expose
/proc/net/sunrpc/nfs in net namespaces") converted the procfs to per-
netns and made the problem more visible. Even when rpc_proc_register()
fails, nfs_net_init() could succeed, and thus nfs_net_exit() will be
called while destroying the netns. Then, remove_proc_entry() will be
called for non-existing proc directory and trigger the warning below.
Let's handle the error of rpc_proc_register() properly in
nfs_net_init(). [0]: name 'nfs' WARNING: CPU: 1 PID: 1710 at
fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0
fs/proc/generic.c:711 Modules linked in: CPU: 1 PID: 1710 Comm: syz-
executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12 Hardware name:
QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP:
0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711 Code: 41 5d
41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09
b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff <0f> 0b eb b1 e8 5c
09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb RSP:
0018:ffffc9000c6d7ce0 EFLAGS: 00010286 RAX: 0000000000000000 RBX:
ffff8880422b8b00 RCX: ffffffff8110503c RDX: ffff888030652f00 RSI:
ffffffff81105045 RDI: 0000000000000001 RBP: 0000000000000000 R08:
0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11:
ffffffff81bb62cb R12: ffffffff84807ffc R13: ffff88804ad6fcc0 R14:
ffffffff84807ffc R15: ffffffff85741ff8 FS: 00007f30cfba8640(0000)
GS:ffff88807dd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES:
0000 CR0: 0000000080050033 CR2: 00007ff51afe8000 CR3: 000000005a60a005
CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400 PKRU: 55555554 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-36939 https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8 https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8 https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65 https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65 https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3 https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3 https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021 https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021 |