跳转到帖子

Ubuntu: (Multiple Advisories) (CVE-2024-35929): Linux kernel vulnerabilities

recommended_posts

发布于
  • Members

Ubuntu: (Multiple Advisories) (CVE-2024-35929): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
05/19/2024
Created
07/12/2024
Added
07/12/2024
Modified
01/30/2025

Description

In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() For the kernels built with CONFIG_RCU_NOCB_CPU_DEFAULT_ALL=y and CONFIG_RCU_LAZY=y, the following scenarios will trigger WARN_ON_ONCE() in the rcu_nocb_bypass_lock() and rcu_nocb_wait_contended() functions: CPU2 CPU11 kthread rcu_nocb_cb_kthread ksys_write rcu_do_batchvfs_write rcu_torture_timer_cbproc_sys_write __kmem_cache_free proc_sys_call_handler kmemleak_free drop_caches_sysctl_handler delete_object_fulldrop_slab __delete_object shrink_slab put_objectlazy_rcu_shrink_scan call_rcurcu_nocb_flush_bypass __call_rcu_commnrcu_nocb_bypass_lock raw_spin_trylock(&rdp->nocb_bypass_lock) fail atomic_inc(&rdp->nocb_lock_contended); rcu_nocb_wait_contended WARN_ON_ONCE(smp_processor_id() != rdp->cpu); WARN_ON_ONCE(atomic_read(&rdp->nocb_lock_contended))| |_ _ _ _ _ _ _ _ _ _same rdp and rdp->cpu != 11_ _ _ _ _ _ _ _ _ __| Reproduce this bug with "echo 3 > /proc/sys/vm/drop_caches". This commit therefore uses rcu_nocb_try_flush_bypass() instead of rcu_nocb_flush_bypass() in lazy_rcu_shrink_scan().If the nocb_bypass queue is being flushed, then rcu_nocb_try_flush_bypass will return directly.

Solution(s)

  • ubuntu-upgrade-linux-image-6-8-0-1006-gke
  • ubuntu-upgrade-linux-image-6-8-0-1007-intel
  • ubuntu-upgrade-linux-image-6-8-0-1007-raspi
  • ubuntu-upgrade-linux-image-6-8-0-1008-ibm
  • ubuntu-upgrade-linux-image-6-8-0-1008-oem
  • ubuntu-upgrade-linux-image-6-8-0-1008-oracle
  • ubuntu-upgrade-linux-image-6-8-0-1008-oracle-64k
  • ubuntu-upgrade-linux-image-6-8-0-1009-nvidia
  • ubuntu-upgrade-linux-image-6-8-0-1009-nvidia-64k
  • ubuntu-upgrade-linux-image-6-8-0-1010-azure
  • ubuntu-upgrade-linux-image-6-8-0-1010-azure-fde
  • ubuntu-upgrade-linux-image-6-8-0-1010-gcp
  • ubuntu-upgrade-linux-image-6-8-0-1011-aws
  • ubuntu-upgrade-linux-image-6-8-0-38-generic
  • ubuntu-upgrade-linux-image-6-8-0-38-generic-64k
  • ubuntu-upgrade-linux-image-6-8-0-38-lowlatency
  • ubuntu-upgrade-linux-image-6-8-0-38-lowlatency-64k
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-fde
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-ibm-classic
  • ubuntu-upgrade-linux-image-ibm-lts-24-04
  • ubuntu-upgrade-linux-image-intel
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-64k
  • ubuntu-upgrade-linux-image-nvidia
  • ubuntu-upgrade-linux-image-nvidia-64k
  • ubuntu-upgrade-linux-image-oem-24-04
  • ubuntu-upgrade-linux-image-oem-24-04a
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-64k
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-24-04

References

  • https://attackerkb.com/topics/cve-2024-35929
  • CVE - 2024-35929
  • USN-6893-1
  • USN-6893-2
  • USN-6893-3
  • USN-6918-1
  • 查看数 698
  • 已创建
  • 最后回复