lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024090456-CVE-2024-44969-48bf@gregkh>
Date: Wed,  4 Sep 2024 20:56:56 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Prevent release of buffer in I/O

When a task waiting for completion of a Store Data operation is
interrupted, an attempt is made to halt this operation. If this attempt
fails due to a hardware or firmware problem, there is a chance that the
SCLP facility might store data into buffers referenced by the original
operation at a later time.

Handle this situation by not releasing the referenced data buffers if
the halt attempt fails. For current use cases, this might result in a
leak of few pages of memory in case of a rare hardware/firmware
malfunction.

The Linux kernel CVE team has assigned CVE-2024-44969 to this issue.


Affected and fixed versions
===========================

	Fixed in 4.19.320 with commit 7a7e60ed23d4
	Fixed in 5.4.282 with commit 1ec5ea9e25f5
	Fixed in 5.10.224 with commit a3e52a4c22c8
	Fixed in 5.15.165 with commit a88a49473c94
	Fixed in 6.1.105 with commit 46f67233b011
	Fixed in 6.6.46 with commit 1e8b7fb427af
	Fixed in 6.10.5 with commit 2429ea3b4330
	Fixed in 6.11-rc1 with commit bf365071ea92

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-44969
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/s390/char/sclp_sd.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/7a7e60ed23d471a07dbbe72565d2992ee8244bbe
	https://git.kernel.org/stable/c/1ec5ea9e25f582fd6999393e2f2c3bf56f234e05
	https://git.kernel.org/stable/c/a3e52a4c22c846858a6875e1c280030a3849e148
	https://git.kernel.org/stable/c/a88a49473c94ccfd8dce1e766aacf3c627278463
	https://git.kernel.org/stable/c/46f67233b011385d53cf14d272431755de3a7c79
	https://git.kernel.org/stable/c/1e8b7fb427af6b2ddd54eff66a6b428a81c96633
	https://git.kernel.org/stable/c/2429ea3b4330e3653b72b210a0d5f2a717359506
	https://git.kernel.org/stable/c/bf365071ea92b9579d5a272679b74052a5643e35

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ