Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2024-56770

CVE-2024-56770

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: netem: account for backlog updates from child qdisc In general, \'qlen\' of any classful qdisc should keep track of the number of packets that the qdisc itself and all of its children holds. In case of netem, \'qlen\' only accounts for the packets in its internal tfifo. When netem is used with a child qdisc, the child qdisc can use \'qdisc_tree_reduce_backlog\' to inform its parent, netem, about created or dropped SKBs. This function updates \'qlen\' and the backlog statistics of netem, but netem does not account for changes made by a child qdisc. \'qlen\' then indicates the wrong number of packets in the tfifo. If a child qdisc creates new SKBs during enqueue and informs its parent about this, netem\'s \'qlen\' value is increased. When netem dequeues the newly created SKBs from the child, the \'qlen\' in netem is not updated. If \'qlen\' reaches the configured sch->limit, the enqueue function stops working, even though the tfifo is not full. Reproduce the bug: Ensure that the sender machine has GSO enabled. Configure netem as root qdisc and tbf as its child on the outgoing interface of the machine as follows: $ tc qdisc add dev <oif> root handle 1: netem delay 100ms limit 100 $ tc qdisc add dev <oif> parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms Send bulk TCP traffic out via this interface, e.g., by running an iPerf3 client on the machine. Check the qdisc statistics: $ tc -s qdisc show dev <oif> Statistics after 10s of iPerf3 TCP test before the fix (note that netem\'s backlog > limit, netem stopped accepting packets): qdisc netem 1: root refcnt 2 limit 1000 delay 100ms Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0) backlog 4294528236b 1155p requeues 0 qdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0) backlog 0b 0p requeues 0 Statistics after the fix: qdisc netem 1: root refcnt 2 limit 1000 delay 100ms Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0) backlog 0b 0p requeues 0 qdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0) backlog 0b 0p requeues 0 tbf segments the GSO SKBs (tbf_segment) and updates the netem\'s \'qlen\'. The interface fully stops transferring packets and locks. In this case, the child qdisc and tfifo are empty, but \'qlen\' indicates the tfifo is at its limit and no more packets are accepted. This patch adds a counter for the entries in the tfifo. Netem\'s \'qlen\' is only decreased when a packet is returned by its dequeue function, and not during enqueuing into the child qdisc. External updates to \'qlen\' are thus accounted for and only the behavior of the backlog statistics changes. As in other qdiscs, \'qlen\' then keeps track of how many packets are held in netem and all of its children. As before, sch->limit remains as the maximum number of packets in the tfifo. The same applies to netem\'s backlog statistics.

Priority: --
CVSS v3: --
Component: linux
Publish Date: Jan 8, 2025
Related ID: --
CVSS v2: --
Modified Date: Jan 8, 2025

Find out more about CVE-2024-56770 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Requires LTSS -- -- --
Wind River Linux 8 Requires LTSS -- -- --
Wind River Linux 9 Requires LTSS -- -- --
Wind River Linux 7 Requires LTSS -- -- --
Wind River Linux LTS 21 Investigating -- -- --
Wind River Linux LTS 22 Fixed -- None --
Wind River Linux LTS 18 Requires LTSS -- -- --
Wind River Linux LTS 19 Requires LTSS -- -- --
Wind River Linux CD release N/A -- -- --
Wind River Linux 6 Requires LTSS -- -- --
Wind River Linux LTS 23 Fixed -- None --
Wind River Linux LTS 24 Fixed LIN1024-6299
10.24.33.5 --
VxWorks
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --
Helix Virtualization Platform Cert Edition
Helix Virtualization Platform Cert Edition Not Vulnerable -- -- --
eLxr
eLxr 12 Vulnerable -- -- --
Wind River Studio Cloud Platform

Related Products

Product Name Status Defect Fixed Downloads

Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online