{"id":"CVE-2024-41005","summary":"netpoll: Fix race condition in netpoll_owner_active","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n\u003csnip\u003e\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n\u003csnip\u003e\n\tvalue changed: 0x0000000a -\u003e 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi-\u003epoll_owner\nnon atomically. The -\u003epoll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.","modified":"2026-04-02T12:17:24.316058Z","published":"2024-07-12T12:44:40.467Z","related":["ALSA-2024:7000","ALSA-2024:7001","ALSA-2024:8617","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41005.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3f1a155950a1685ffd0fd7175b3f671da8771f3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43c0ca793a18578a0f5b305dd77fcf7ed99f1265"},{"type":"WEB","url":"https://git.kernel.org/stable/c/96826b16ef9c6568d31a1f6ceaa266411a46e46c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a130e7da73ae93afdb4659842267eec734ffbd57"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2e6a872bde9912f1a7579639c5ca3adf1003916"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41005.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41005"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"89c4b442b78bdba388337cc746fe63caba85f46c"},{"fixed":"43c0ca793a18578a0f5b305dd77fcf7ed99f1265"},{"fixed":"efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e"},{"fixed":"96826b16ef9c6568d31a1f6ceaa266411a46e46c"},{"fixed":"3f1a155950a1685ffd0fd7175b3f671da8771f3d"},{"fixed":"a130e7da73ae93afdb4659842267eec734ffbd57"},{"fixed":"c2e6a872bde9912f1a7579639c5ca3adf1003916"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41005.json"}}],"schema_version":"1.7.5"}