CVE-2024-35975

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35975
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35975.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35975
Downstream
Related
Published
2024-05-20T09:42:01.758Z
Modified
2025-11-20T04:28:07.567177Z
Summary
octeontx2-pf: Fix transmit scheduler resource leak
Details

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix transmit scheduler resource leak

Inorder to support shaping and scheduling, Upon class creation Netdev driver allocates trasmit schedulers.

The previous patch which added support for Round robin scheduling has a bug due to which driver is not freeing transmit schedulers post class deletion.

This patch fixes the same.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
47a9656f168a4b76a1e069ed8a67924ea8c1ac43
Fixed
7af5582ea67209a23e44be9a9612ba7897be1f47
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
47a9656f168a4b76a1e069ed8a67924ea8c1ac43
Fixed
b34fe77a1b18654233e4e54b334fcaeddf487100
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
47a9656f168a4b76a1e069ed8a67924ea8c1ac43
Fixed
bccb798e07f8bb8b91212fe8ed1e421685449076

Affected versions

v6.*

v6.5
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.8.5
v6.8.6
v6.9-rc1
v6.9-rc2

Database specific

vanir_signatures

[
    {
        "id": "CVE-2024-35975-0281fbaf",
        "signature_version": "v1",
        "digest": {
            "function_hash": "227780233390084989565711290337288853421",
            "length": 409.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7af5582ea67209a23e44be9a9612ba7897be1f47",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c",
            "function": "otx2_qos_read_txschq_cfg_tl"
        }
    },
    {
        "id": "CVE-2024-35975-08c48e5f",
        "signature_version": "v1",
        "digest": {
            "function_hash": "227780233390084989565711290337288853421",
            "length": 409.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b34fe77a1b18654233e4e54b334fcaeddf487100",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c",
            "function": "otx2_qos_read_txschq_cfg_tl"
        }
    },
    {
        "id": "CVE-2024-35975-2745b301",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "338630533265909413884942259720556427648",
                "34545696004456081878363688424813203480",
                "194617759332336834245425688969833700273",
                "227162212780624164650912038120257397234"
            ]
        },
        "deprecated": false,
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b34fe77a1b18654233e4e54b334fcaeddf487100",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c"
        }
    },
    {
        "id": "CVE-2024-35975-4e68ded3",
        "signature_version": "v1",
        "digest": {
            "function_hash": "227780233390084989565711290337288853421",
            "length": 409.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bccb798e07f8bb8b91212fe8ed1e421685449076",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c",
            "function": "otx2_qos_read_txschq_cfg_tl"
        }
    },
    {
        "id": "CVE-2024-35975-67abd65a",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "338630533265909413884942259720556427648",
                "34545696004456081878363688424813203480",
                "194617759332336834245425688969833700273",
                "227162212780624164650912038120257397234"
            ]
        },
        "deprecated": false,
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bccb798e07f8bb8b91212fe8ed1e421685449076",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c"
        }
    },
    {
        "id": "CVE-2024-35975-fbc6c1fd",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "338630533265909413884942259720556427648",
                "34545696004456081878363688424813203480",
                "194617759332336834245425688969833700273",
                "227162212780624164650912038120257397234"
            ]
        },
        "deprecated": false,
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7af5582ea67209a23e44be9a9612ba7897be1f47",
        "target": {
            "file": "drivers/net/ethernet/marvell/octeontx2/nic/qos.c"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.28
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.7