wireguard: receive: annotate data-race around receiving_counter.counter
Syzkaller with KCSAN identified a data-race issue when accessing
keypair->receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()
annotations to mark the data race as intentional.
BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll
write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:
counter_validate drivers/net/wireguard/receive.c:321 [inline]
wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461
__napi_poll+0x60/0x3b0 net/core/dev.c:6536
napi_poll net/core/dev.c:6605 [inline]
net_rx_action+0x32b/0x750 net/core/dev.c:6738
__do_softirq+0xc4/0x279 kernel/softirq.c:553
do_softirq+0x5e/0x90 kernel/softirq.c:454
__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499
process_one_work kernel/workqueue.c:2633 [inline]
...
read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:
decrypt_packet drivers/net/wireguard/receive.c:252 [inline]
wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501
process_one_work kernel/workqueue.c:2633 [inline]
process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706
worker_thread+0x525/0x730 kernel/workqueue.c:2787
...
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
DSA-5681-1 | linux security update |
![]() |
USN-6816-1 | Linux kernel vulnerabilities |
![]() |
USN-6817-1 | Linux kernel vulnerabilities |
![]() |
USN-6817-2 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6817-3 | Linux kernel vulnerabilities |
![]() |
USN-6820-1 | Linux kernel vulnerabilities |
![]() |
USN-6820-2 | Linux kernel (NVIDIA) vulnerabilities |
![]() |
USN-6821-1 | Linux kernel vulnerabilities |
![]() |
USN-6821-2 | Linux kernel vulnerabilities |
![]() |
USN-6821-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6821-4 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6828-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6871-1 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-6878-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6892-1 | Linux kernel (IBM) vulnerabilities |
![]() |
USN-6919-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 02 Apr 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
Thu, 12 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T12:55:00.752Z
Reserved: 2024-02-19T14:20:24.184Z
Link: CVE-2024-26861

Updated: 2024-08-02T00:21:04.156Z

Status : Analyzed
Published: 2024-04-17T11:15:08.997
Modified: 2025-04-02T13:16:54.733
Link: CVE-2024-26861


No data.