发布时间: 2024年8月23日
修改时间: 2024年8月30日
In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netpoll warnings from sungem: netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398) WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c gem_poll_controller() disables interrupts, which may sleep. We can't sleep in netpoll, it has interrupts disabled completely. Strangely, gem_poll_controller() doesn't even poll the completions, and instead acts as if an interrupt has fired so it just schedules NAPI and exits. None of this has been necessary for years, since netpoll invokes NAPI directly.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Local | Local |
CVSS评分 | 5.5 | 4.4 |
Attack Complexity | Low | Low |
Privileges Required | Low | High |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-3569 | kernel security update | 2024年8月23日 |
KylinSec-SA-2024-4842 | kernel security update | 2025年2月17日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |
KY3.5.3 | kernel | Fixed |
V6 | kernel | Fixed |