[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024071208-CVE-2024-40904-48b1@gregkh>
Date: Fri, 12 Jul 2024 14:21:22 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-40904: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
The syzbot fuzzer found that the interrupt-URB completion callback in
the cdc-wdm driver was taking too long, and the driver's immediate
resubmission of interrupt URBs with -EPROTO status combined with the
dummy-hcd emulation to cause a CPU lockup:
cdc_wdm 1-1:1.0: nonzero urb status received: -71
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
CPU#0 Utilization every 4s during lockup:
#1: 98% system, 0% softirq, 3% hardirq, 0% idle
#2: 98% system, 0% softirq, 3% hardirq, 0% idle
#3: 98% system, 0% softirq, 3% hardirq, 0% idle
#4: 98% system, 0% softirq, 3% hardirq, 0% idle
#5: 98% system, 1% softirq, 3% hardirq, 0% idle
Modules linked in:
irq event stamp: 73096
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_emit_next_record kernel/printk/printk.c:2935 [inline]
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
hardirqs last disabled at (73096): [<ffff80008af10b00>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (73096): [<ffff80008af10b00>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last enabled at (73048): [<ffff8000801ea530>] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last enabled at (73048): [<ffff8000801ea530>] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
softirqs last disabled at (73043): [<ffff800080020de8>] __do_softirq+0x14/0x20 kernel/softirq.c:588
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Testing showed that the problem did not occur if the two error
messages -- the first two lines above -- were removed; apparently adding
material to the kernel log takes a surprisingly large amount of time.
In any case, the best approach for preventing these lockups and to
avoid spamming the log with thousands of error messages per second is
to ratelimit the two dev_err() calls. Therefore we replace them with
dev_err_ratelimited().
The Linux kernel CVE team has assigned CVE-2024-40904 to this issue.
Affected and fixed versions
===========================
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 4.19.317 with commit 217d1f44fff5
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 5.4.279 with commit 05b2cd6d33f7
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 5.10.221 with commit c0747d76eb05
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 5.15.162 with commit 53250b54c92f
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 6.1.95 with commit 02a4c0499fc3
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 6.6.35 with commit 72a3fe36cf9f
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 6.9.6 with commit 82075aff7ffc
Issue introduced in 2.6.28 with commit 9908a32e94de and fixed in 6.10-rc4 with commit 22f008128625
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-40904
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/usb/class/cdc-wdm.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56
https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28
https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c
https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879
https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94
https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a
https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c
https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46
Powered by blists - more mailing lists