CVE-2024-42082

Source
https://cve.org/CVERecord?id=CVE-2024-42082
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42082.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-42082
Downstream
Related
Published
2024-07-29T15:52:43.989Z
Modified
2026-03-14T12:35:15.624362Z
Summary
xdp: Remove WARN() from __xdp_reg_mem_model()
Details

In the Linux kernel, the following vulnerability has been resolved:

xdp: Remove WARN() from _xdpregmemmodel()

syzkaller reports a warning in _xdpregmemmodel().

The warning occurs only if __memidinithashtable() returns an error. It returns the error in two cases:

  1. memory allocation fails;
  2. rhashtableinit() fails when some fields of rhashtableparams struct are not initialized properly.

The second case cannot happen since there is a static const rhashtable_params struct with valid fields. So, warning is only triggered when there is a problem with memory allocation.

Thus, there is no sense in using WARN() to handle this error and it can be safely removed.

WARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 _xdpregmemmodel+0x2d9/0x650 net/core/xdp.c:299

CPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:_xdpregmemmodel+0x2d9/0x650 net/core/xdp.c:299

Call Trace: xdpregmemmodel+0x22/0x40 net/core/xdp.c:344 xdptestrunsetup net/bpf/testrun.c:188 [inline] bpftestrunxdplive+0x365/0x1e90 net/bpf/testrun.c:377 bpfprogtestrunxdp+0x813/0x11b0 net/bpf/testrun.c:1267 bpfprogtestrun+0x33a/0x3b0 kernel/bpf/syscall.c:4240 __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649 __dosysbpf kernel/bpf/syscall.c:5738 [inline] __sesysbpf kernel/bpf/syscall.c:5736 [inline] __x64sysbpf+0x7c/0x90 kernel/bpf/syscall.c:5736 dosyscall64+0xfb/0x240 entrySYSCALL64afterhwframe+0x6d/0x75

Found by Linux Verification Center (linuxtesting.org) with syzkaller.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42082.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8d5d88527587516bd58ff0f3810f07c38e65e2be
Fixed
1095b8efbb13a6a5fa583ed373ee1ccab29da2d0
Fixed
1d3e3b3aa2cbe9bc7db9a7f8673a9fa6d2990d54
Fixed
4e0c539ee265d5c6e7fa7d229cd4aa7bc01816e2
Fixed
14e51ea78b4ccacb7acb1346b9241bb790a2054c
Fixed
f92298b0467fd77edc4c1a2c3e48833e69840ec4
Fixed
7e9f79428372c6eab92271390851be34ab26bfb4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42082.json"