CVE-2024-35929

In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() For the kernels built with CONFIG_RCU_NOCB_CPU_DEFAULT_ALL=y and CONFIG_RCU_LAZY=y, the following scenarios will trigger WARN_ON_ONCE() in the rcu_nocb_bypass_lock() and rcu_nocb_wait_contended() functions: CPU2 CPU11 kthread rcu_nocb_cb_kthread ksys_write rcu_do_batch vfs_write rcu_torture_timer_cb proc_sys_write __kmem_cache_free proc_sys_call_handler kmemleak_free drop_caches_sysctl_handler delete_object_full drop_slab __delete_object shrink_slab put_object lazy_rcu_shrink_scan call_rcu rcu_nocb_flush_bypass __call_rcu_commn rcu_nocb_bypass_lock raw_spin_trylock(&rdp->nocb_bypass_lock) fail atomic_inc(&rdp->nocb_lock_contended); rcu_nocb_wait_contended WARN_ON_ONCE(smp_processor_id() != rdp->cpu); WARN_ON_ONCE(atomic_read(&rdp->nocb_lock_contended)) | |_ _ _ _ _ _ _ _ _ _same rdp and rdp->cpu != 11_ _ _ _ _ _ _ _ _ __| Reproduce this bug with "echo 3 > /proc/sys/vm/drop_caches". This commit therefore uses rcu_nocb_try_flush_bypass() instead of rcu_nocb_flush_bypass() in lazy_rcu_shrink_scan(). If the nocb_bypass queue is being flushed, then rcu_nocb_try_flush_bypass will return directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Dec 2024, 19:56

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc - () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc - Patch
References () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a - () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a - Patch
References () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f - () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc - () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc -
References () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a - () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a -
References () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f - () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: rcu/nocb: corrija WARN_ON_ONCE() en rcu_nocb_bypass_lock() Para los kernels creados con CONFIG_RCU_NOCB_CPU_DEFAULT_ALL=y y CONFIG_RCU_LAZY=y, los siguientes escenarios activarán WARN_ON_ONCE() en rcu_nocb_bypass_lock( ) y funciones rcu_nocb_wait_contended(): CPU2 CPU11 kthread rcu_nocb_cb_kthread ksys_write rcu_do_batch vfs_write rcu_torture_timer_cb proc_sys_write __kmem_cache_free proc_sys_call_handler kmemleak_free drop_caches_sysctl_handler delete_object_full losa __delete_object encogimiento_slab put_object lazy_rcu_shrink_scan call_rcu rcu_nocb_flush_bypass __call_rcu_commn rcu_nocb_bypass_lock raw_spin_trylock(&rdp->nocb_bypass_lock) fail atomic_inc(&rdp->nocb_lock_contended); rcu_nocb_wait_contended WARN_ON_ONCE(smp_processor_id()!= rdp->cpu); WARN_ON_ONCE(atomic_read(&rdp->nocb_lock_contended)) | |_ _ _ _ _ _ _ _ _ _mismo rdp y rdp->cpu != 11_ _ _ _ _ _ _ _ _ __| Reproduzca este error con "echo 3 > /proc/sys/vm/drop_caches". Por lo tanto, esta confirmación utiliza rcu_nocb_try_flush_bypass() en lugar de rcu_nocb_flush_bypass() en lazy_rcu_shrink_scan(). Si se está vaciando la cola nocb_bypass, entonces rcu_nocb_try_flush_bypass regresará directamente.

20 May 2024, 13:00

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 11:15

Updated : 2024-12-30 19:56


NVD link : CVE-2024-35929

Mitre link : CVE-2024-35929

CVE.ORG link : CVE-2024-35929


JSON object : View

Products Affected

linux

  • linux_kernel