{"id":"CVE-2024-47734","summary":"bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()\n\nsyzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce\nthis[1], one bond device (bond1) has xdpdrv, which increases\nbpf_master_redirect_enabled_key. Another bond device (bond0) which is\nunsupported by XDP but its slave (veth3) has xdpgeneric that returns\nXDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().\nTo reduce unnecessary warnings and improve log management, we need to\ndelete the WARN_ON_ONCE() and add ratelimit to the netdev_err().\n\n[1] Steps to reproduce:\n    # Needs tx_xdp with return XDP_TX;\n    ip l add veth0 type veth peer veth1\n    ip l add veth3 type veth peer veth4\n    ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP\n    ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default\n    ip l set veth0 master bond1\n    ip l set bond1 up\n    # Increases bpf_master_redirect_enabled_key\n    ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx\n    ip l set veth3 master bond0\n    ip l set bond0 up\n    ip l set veth4 up\n    # Triggers WARN_ON_ONCE() from the xdp_master_redirect()\n    ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx","modified":"2026-04-02T12:20:25.178971Z","published":"2024-10-21T12:14:05.195Z","related":["MGASA-2024-0344","MGASA-2024-0345","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47734.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/57b5fba55c6f8b1d83312a34bd656166fcd95658"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6b64197b4bf1a5703a8b105367baf20f1e627a75"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72e2c0825a480e19ee999cee9d018850d38c82b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1be35e774f8ed415e01209fddd963c5a74e8e9f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47734.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47734"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9e2ee5c7e7c35d195e2aa0692a7241d47a433d1e"},{"fixed":"c1be35e774f8ed415e01209fddd963c5a74e8e9f"},{"fixed":"6b64197b4bf1a5703a8b105367baf20f1e627a75"},{"fixed":"ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8"},{"fixed":"72e2c0825a480e19ee999cee9d018850d38c82b9"},{"fixed":"57b5fba55c6f8b1d83312a34bd656166fcd95658"},{"fixed":"0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47734.json"}}],"schema_version":"1.7.5"}