lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024053040-CVE-2024-36950-9f0e@gregkh>
Date: Thu, 30 May 2024 17:35:47 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-36950: firewire: ohci: mask bus reset interrupts between ISR and bottom half

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

firewire: ohci: mask bus reset interrupts between ISR and bottom half

In the FireWire OHCI interrupt handler, if a bus reset interrupt has
occurred, mask bus reset interrupts until bus_reset_work has serviced and
cleared the interrupt.

Normally, we always leave bus reset interrupts masked. We infer the bus
reset from the self-ID interrupt that happens shortly thereafter. A
scenario where we unmask bus reset interrupts was introduced in 2008 in
a007bb857e0b26f5d8b73c2ff90782d9c0972620: If
OHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we
will unmask bus reset interrupts so we can log them.

irq_handler logs the bus reset interrupt. However, we can't clear the bus
reset event flag in irq_handler, because we won't service the event until
later. irq_handler exits with the event flag still set. If the
corresponding interrupt is still unmasked, the first bus reset will
usually freeze the system due to irq_handler being called again each
time it exits. This freeze can be reproduced by loading firewire_ohci
with "modprobe firewire_ohci debug=-1" (to enable all debugging output).
Apparently there are also some cases where bus_reset_work will get called
soon enough to clear the event, and operation will continue normally.

This freeze was first reported a few months after a007bb85 was committed,
but until now it was never fixed. The debug level could safely be set
to -1 through sysfs after the module was loaded, but this would be
ineffectual in logging bus reset interrupts since they were only
unmasked during initialization.

irq_handler will now leave the event flag set but mask bus reset
interrupts, so irq_handler won't be called again and there will be no
freeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will
unmask the interrupt after servicing the event, so future interrupts
will be caught as desired.

As a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be
enabled through sysfs in addition to during initial module loading.
However, when enabled through sysfs, logging of bus reset interrupts will
be effective only starting with the second bus reset, after
bus_reset_work has executed.

The Linux kernel CVE team has assigned CVE-2024-36950 to this issue.


Affected and fixed versions
===========================

	Fixed in 4.19.314 with commit b3948c69d602
	Fixed in 5.4.276 with commit 31279bbca40d
	Fixed in 5.10.217 with commit fa273f312334
	Fixed in 5.15.159 with commit 4f9cc355c328
	Fixed in 6.1.91 with commit 6fafe3661712
	Fixed in 6.6.31 with commit 5982887de60c
	Fixed in 6.8.10 with commit 8643332aac05
	Fixed in 6.9 with commit 752e3c53de0f

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-36950
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/firewire/ohci.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130
	https://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec
	https://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c
	https://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420
	https://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d
	https://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0
	https://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61
	https://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ