lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024062004-CVE-2022-48745-7f0a@gregkh>
Date: Thu, 20 Jun 2024 13:16:25 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-48745: net/mlx5: Use del_timer_sync in fw reset flow of halting poll

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Use del_timer_sync in fw reset flow of halting poll

Substitute del_timer() with del_timer_sync() in fw reset polling
deactivation flow, in order to prevent a race condition which occurs
when del_timer() is called and timer is deactivated while another
process is handling the timer interrupt. A situation that led to
the following call trace:
	RIP: 0010:run_timer_softirq+0x137/0x420
	<IRQ>
	recalibrate_cpu_khz+0x10/0x10
	ktime_get+0x3e/0xa0
	? sched_clock_cpu+0xb/0xc0
	__do_softirq+0xf5/0x2ea
	irq_exit_rcu+0xc1/0xf0
	sysvec_apic_timer_interrupt+0x9e/0xc0
	asm_sysvec_apic_timer_interrupt+0x12/0x20
	</IRQ>

The Linux kernel CVE team has assigned CVE-2022-48745 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 5.10 with commit 38b9f903f22b and fixed in 5.10.97 with commit 502c37b033fa
	Issue introduced in 5.10 with commit 38b9f903f22b and fixed in 5.15.20 with commit f895ebeb44d0
	Issue introduced in 5.10 with commit 38b9f903f22b and fixed in 5.16.6 with commit 2a038dd1d942
	Issue introduced in 5.10 with commit 38b9f903f22b and fixed in 5.17 with commit 3c5193a87b0f

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-48745
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/502c37b033fab7cde3e95a570af4f073306be45e
	https://git.kernel.org/stable/c/f895ebeb44d09d02674cfdd0cfc2bf687603918c
	https://git.kernel.org/stable/c/2a038dd1d942f8fbc495c58fa592ff24af05f1c2
	https://git.kernel.org/stable/c/3c5193a87b0fea090aa3f769d020337662d87b5e

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ