{"id":"CVE-2024-40995","summary":"net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481","modified":"2026-03-20T12:37:27.741419Z","published":"2024-07-12T12:37:37.791Z","related":["ALSA-2024:7000","ALSA-2024:7001","ALSA-2024:8617","SUSE-SU-2024:2892-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40995.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25987a97eec4d5f897cd04ee1b45170829c610da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f926aa96b08b6c47178fe1171e7ae331c695fc2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6fc78d67f51aeb9a542d39a8714e16bc411582d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a0e497b597df7c4cf2b63fc6e9188b6cabe5335"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c6a7da65a296745535a964be1019ec7691b0cb90"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d864319871b05fadd153e0aede4811ca7008f5d6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40995.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40995"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0190c1d452a91c38a3462abdd81752be1b9006a8"},{"fixed":"0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74"},{"fixed":"c6a7da65a296745535a964be1019ec7691b0cb90"},{"fixed":"25987a97eec4d5f897cd04ee1b45170829c610da"},{"fixed":"6fc78d67f51aeb9a542d39a8714e16bc411582d4"},{"fixed":"5f926aa96b08b6c47178fe1171e7ae331c695fc2"},{"fixed":"7a0e497b597df7c4cf2b63fc6e9188b6cabe5335"},{"fixed":"d864319871b05fadd153e0aede4811ca7008f5d6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40995.json"}}],"schema_version":"1.7.5"}