CVE-2024-56694

In the Linux kernel, the following vulnerability has been resolved: bpf: fix recursive lock when verdict program return SK_PASS When the stream_verdict program returns SK_PASS, it places the received skb into its own receive queue, but a recursive lock eventually occurs, leading to an operating system deadlock. This issue has been present since v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&sk->sk_callback_lock) strp_data_ready strp_read_sock read_sock -> tcp_read_sock strp_recv cb.rcv_msg -> sk_psock_strp_read # now stream_verdict return SK_PASS without peer sock assign __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&sk->sk_callback_lock) <= dead lock ''' This topic has been discussed before, but it has not been fixed. Previous discussion: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 16:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819 -
  • () https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56 -

08 Jan 2025, 17:11

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: se corrige el bloqueo recursivo cuando el programa de veredicto devuelve SK_PASS Cuando el programa stream_verdict devuelve SK_PASS, coloca el skb recibido en su propia cola de recepción, pero finalmente se produce un bloqueo recursivo que provoca un bloqueo del sistema operativo. Este problema ha estado presente desde la versión v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&amp;sk-&gt;sk_callback_lock) strp_data_ready strp_read_sock read_sock -&gt; tcp_read_sock strp_recv cb.rcv_msg -&gt; sk_psock_strp_read # ahora stream_verdict devuelve SK_PASS sin asignación de sock de pares __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&amp;sk-&gt;sk_callback_lock) &lt;= bloqueo muerto ''' Este tema se ha discutido antes, pero no se ha solucionado. Discusión anterior: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72 - () https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72 - Patch
References () https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578 - () https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578 - Patch
References () https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69 - () https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69 - Patch
References () https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d - () https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d - Patch
References () https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561 - () https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561 - Patch
References () https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05 - () https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

28 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-28 10:15

Updated : 2025-01-09 16:16


NVD link : CVE-2024-56694

Mitre link : CVE-2024-56694

CVE.ORG link : CVE-2024-56694


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking