CVE-2024-43835

Source
https://cve.org/CVERecord?id=CVE-2024-43835
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43835.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43835
Downstream
Related
Published
2024-08-17T09:21:52.425Z
Modified
2026-03-11T05:20:45.622132Z
Summary
virtio_net: Fix napi_skb_cache_put warning
Details

In the Linux kernel, the following vulnerability has been resolved:

virtionet: Fix napiskbcacheput warning

After the commit bdacf3e34945 ("net: Use nested-BH locking for napialloccache.") was merged, the following warning began to appear:

 WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0

  __warn+0x12f/0x340
  napi_skb_cache_put+0x82/0x4b0
  napi_skb_cache_put+0x82/0x4b0
  report_bug+0x165/0x370
  handle_bug+0x3d/0x80
  exc_invalid_op+0x1a/0x50
  asm_exc_invalid_op+0x1a/0x20
  __free_old_xmit+0x1c8/0x510
  napi_skb_cache_put+0x82/0x4b0
  __free_old_xmit+0x1c8/0x510
  __free_old_xmit+0x1c8/0x510
  __pfx___free_old_xmit+0x10/0x10

The issue arises because virtio is assuming it's running in NAPI context even when it's not, such as in the netpoll case.

To resolve this, modify virtnetpolltx() to only set NAPI when budget is available. Same for virtnetpollcleantx(), which always assumed that it was in a NAPI context.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43835.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
df133f3f96257ee29696c0ed8bd198ec801dc810
Fixed
d3af435e8ace119e58d8e21d3d2d6a4e7c4a4baa
Fixed
842a97b5e44f0c8a9fc356fe976e0e13ddcf7783
Fixed
cc7340f18e45886121c131227985d64ef666012f
Fixed
6b5325f2457521bbece29499970c0117a648c620
Fixed
f5e9a22d19bb98a7e86034db85eb295e94187caa
Fixed
468a729b78895893d0e580ceea49bed8ada2a2bd
Fixed
f8321fa75102246d7415a6af441872f6637c93ab

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43835.json"