lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024073032-CVE-2024-42145-5c7b@gregkh>
Date: Tue, 30 Jul 2024 09:48:03 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-42145: IB/core: Implement a limit on UMAD receive List

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

IB/core: Implement a limit on UMAD receive List

The existing behavior of ib_umad, which maintains received MAD
packets in an unbounded list, poses a risk of uncontrolled growth.
As user-space applications extract packets from this list, the rate
of extraction may not match the rate of incoming packets, leading
to potential list overflow.

To address this, we introduce a limit to the size of the list. After
considering typical scenarios, such as OpenSM processing, which can
handle approximately 100k packets per second, and the 1-second retry
timeout for most packets, we set the list size limit to 200k. Packets
received beyond this limit are dropped, assuming they are likely timed
out by the time they are handled by user-space.

Notably, packets queued on the receive list due to reasons like
timed-out sends are preserved even when the list is full.

The Linux kernel CVE team has assigned CVE-2024-42145 to this issue.


Affected and fixed versions
===========================

	Fixed in 4.19.318 with commit 1288cf1cceb0
	Fixed in 5.4.280 with commit b4913702419d
	Fixed in 5.10.222 with commit 62349fbf86b5
	Fixed in 5.15.163 with commit d73cb8862e4d
	Fixed in 6.1.98 with commit 63d202d948bb
	Fixed in 6.6.39 with commit b8c5f635997f
	Fixed in 6.9.9 with commit a6627fba793c
	Fixed in 6.10 with commit ca0b44e20a6f

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-42145
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/infiniband/core/user_mad.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb
	https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b
	https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f
	https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607
	https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa
	https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6
	https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4
	https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ