๐Ÿ” CVE Alert

CVE-2024-47734

UNKNOWN 0.0

bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave() syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce this[1], one bond device (bond1) has xdpdrv, which increases bpf_master_redirect_enabled_key. Another bond device (bond0) which is unsupported by XDP but its slave (veth3) has xdpgeneric that returns XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect(). To reduce unnecessary warnings and improve log management, we need to delete the WARN_ON_ONCE() and add ratelimit to the netdev_err(). [1] Steps to reproduce: # Needs tx_xdp with return XDP_TX; ip l add veth0 type veth peer veth1 ip l add veth3 type veth peer veth4 ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default ip l set veth0 master bond1 ip l set bond1 up # Increases bpf_master_redirect_enabled_key ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx ip l set veth3 master bond0 ip l set bond0 up ip l set veth4 up # Triggers WARN_ON_ONCE() from the xdp_master_redirect() ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < c1be35e774f8ed415e01209fddd963c5a74e8e9f 9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < 6b64197b4bf1a5703a8b105367baf20f1e627a75 9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8 9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < 72e2c0825a480e19ee999cee9d018850d38c82b9 9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < 57b5fba55c6f8b1d83312a34bd656166fcd95658 9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e < 0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c1be35e774f8ed415e01209fddd963c5a74e8e9f git.kernel.org: https://git.kernel.org/stable/c/6b64197b4bf1a5703a8b105367baf20f1e627a75 git.kernel.org: https://git.kernel.org/stable/c/ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8 git.kernel.org: https://git.kernel.org/stable/c/72e2c0825a480e19ee999cee9d018850d38c82b9 git.kernel.org: https://git.kernel.org/stable/c/57b5fba55c6f8b1d83312a34bd656166fcd95658 git.kernel.org: https://git.kernel.org/stable/c/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html