Bugzilla – Bug 1227102
VUL-0: CVE-2024-39293: kernel: revert "xsk: support redirect to any socket bound to the same umem"
Last modified: 2024-06-28 13:30:46 UTC
In the Linux kernel, the following vulnerability has been resolved: Revert "xsk: Support redirect to any socket bound to the same umem" This reverts commit 2863d665ea41282379f108e4da6c8a2366ba66db. This patch introduced a potential kernel crash when multiple napi instances redirect to the same AF_XDP socket. By removing the queue_index check, it is possible for multiple napi instances to access the Rx ring at the same time, which will result in a corrupted ring state which can lead to a crash when flushing the rings in __xsk_flush(). This can happen when the linked list of sockets to flush gets corrupted by concurrent accesses. A quick and small fix is not possible, so let us revert this for now. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-39293 https://www.cve.org/CVERecord?id=CVE-2024-39293 https://git.kernel.org/stable/c/19cb40b1064566ea09538289bfcf5bc7ecb9b6f5 https://git.kernel.org/stable/c/7fcf26b315bbb728036da0862de6b335da83dff2 https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-39293.mbox https://bugzilla.redhat.com/show_bug.cgi?id=2294272