cve-2024-44950
Vulnerability from cvelistv5
Published
2024-09-04 18:35
Modified
2024-12-19 09:18
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: fix invalid FIFO access with special register set When enabling access to the special register set, Receiver time-out and RHR interrupts can happen. In this case, the IRQ handler will try to read from the FIFO thru the RHR register at address 0x00, but address 0x00 is mapped to DLL register, resulting in erroneous FIFO reading. Call graph example: sc16is7xx_startup(): entry sc16is7xx_ms_proc(): entry sc16is7xx_set_termios(): entry sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set sc16is7xx_port_irq() entry --> IIR is 0x0C sc16is7xx_handle_rx() entry sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is mapped to DLL (LCR=LCR_CONF_MODE_A) sc16is7xx_set_baud(): exit --> Restore access to general register set Fix the problem by claiming the efr_lock mutex when accessing the Special register set.
Impacted products
Vendor Product Version
Linux Linux Version: dfeae619d781dee61666d5551b93ba3be755a86b
Version: dfeae619d781dee61666d5551b93ba3be755a86b
Version: dfeae619d781dee61666d5551b93ba3be755a86b
Version: dfeae619d781dee61666d5551b93ba3be755a86b
Create a notification for this product.
   Linux Linux Version: 3.16
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-44950",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T17:40:23.237971Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-12T17:33:37.131Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/tty/serial/sc16is7xx.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "cc6a3f35bc9b3a8da1b195420a2e8d9fdadfa831",
                     status: "affected",
                     version: "dfeae619d781dee61666d5551b93ba3be755a86b",
                     versionType: "git",
                  },
                  {
                     lessThan: "dc5ead0e8fc5ef53b8553394d4aab60c277976b3",
                     status: "affected",
                     version: "dfeae619d781dee61666d5551b93ba3be755a86b",
                     versionType: "git",
                  },
                  {
                     lessThan: "6a6730812220a9a5ce4003eb347da1ee5abd06b0",
                     status: "affected",
                     version: "dfeae619d781dee61666d5551b93ba3be755a86b",
                     versionType: "git",
                  },
                  {
                     lessThan: "7d3b793faaab1305994ce568b59d61927235f57b",
                     status: "affected",
                     version: "dfeae619d781dee61666d5551b93ba3be755a86b",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/tty/serial/sc16is7xx.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "3.16",
                  },
                  {
                     lessThan: "3.16",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.120",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.64",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.5",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.11",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: fix invalid FIFO access with special register set\n\nWhen enabling access to the special register set, Receiver time-out and\nRHR interrupts can happen. In this case, the IRQ handler will try to read\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\nmapped to DLL register, resulting in erroneous FIFO reading.\n\nCall graph example:\n    sc16is7xx_startup(): entry\n    sc16is7xx_ms_proc(): entry\n    sc16is7xx_set_termios(): entry\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\n    sc16is7xx_handle_rx() entry\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\n\nFix the problem by claiming the efr_lock mutex when accessing the Special\nregister set.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:18:59.037Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/cc6a3f35bc9b3a8da1b195420a2e8d9fdadfa831",
            },
            {
               url: "https://git.kernel.org/stable/c/dc5ead0e8fc5ef53b8553394d4aab60c277976b3",
            },
            {
               url: "https://git.kernel.org/stable/c/6a6730812220a9a5ce4003eb347da1ee5abd06b0",
            },
            {
               url: "https://git.kernel.org/stable/c/7d3b793faaab1305994ce568b59d61927235f57b",
            },
         ],
         title: "serial: sc16is7xx: fix invalid FIFO access with special register set",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-44950",
      datePublished: "2024-09-04T18:35:50.602Z",
      dateReserved: "2024-08-21T05:34:56.665Z",
      dateUpdated: "2024-12-19T09:18:59.037Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-44950\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-04T19:15:30.100\",\"lastModified\":\"2024-12-14T21:15:24.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nserial: sc16is7xx: fix invalid FIFO access with special register set\\n\\nWhen enabling access to the special register set, Receiver time-out and\\nRHR interrupts can happen. In this case, the IRQ handler will try to read\\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\\nmapped to DLL register, resulting in erroneous FIFO reading.\\n\\nCall graph example:\\n    sc16is7xx_startup(): entry\\n    sc16is7xx_ms_proc(): entry\\n    sc16is7xx_set_termios(): entry\\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\\n    sc16is7xx_handle_rx() entry\\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\\n\\nFix the problem by claiming the efr_lock mutex when accessing the Special\\nregister set.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: sc16is7xx: se corrige el acceso FIFO no válido con un conjunto de registros especiales. Al habilitar el acceso al conjunto de registros especiales, pueden producirse interrupciones de RHR y tiempo de espera del receptor. En este caso, el controlador IRQ intentará leer desde el FIFO a través del registro RHR en la dirección 0x00, pero la dirección 0x00 está asignada al registro DLL, lo que da como resultado una lectura FIFO errónea. Ejemplo de gráfico de llamadas: sc16is7xx_startup(): entrada sc16is7xx_ms_proc(): entrada sc16is7xx_set_termios(): entrada sc16is7xx_set_baud(): DLH/DLL = $009C --> acceder al conjunto de registros especiales sc16is7xx_port_irq() entrada --> IIR es 0x0C sc16is7xx_handle_rx() entrada sc16is7xx_fifo_read(): --> no se puede acceder a FIFO (RHR) porque está asignado a DLL (LCR=LCR_CONF_MODE_A) sc16is7xx_set_baud(): salida --> Restaurar el acceso al conjunto de registros generales Solucione el problema reclamando el mutex efr_lock al acceder al conjunto de registros especiales.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.16\",\"versionEndExcluding\":\"6.10.5\",\"matchCriteriaId\":\"2AAEF74C-138D-4D04-8AD8-163EB2A9720E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6a6730812220a9a5ce4003eb347da1ee5abd06b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7d3b793faaab1305994ce568b59d61927235f57b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cc6a3f35bc9b3a8da1b195420a2e8d9fdadfa831\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc5ead0e8fc5ef53b8553394d4aab60c277976b3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44950\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T17:40:23.237971Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:27.682Z\"}}], \"cna\": {\"title\": \"serial: sc16is7xx: fix invalid FIFO access with special register set\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"dfeae619d781\", \"lessThan\": \"cc6a3f35bc9b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dfeae619d781\", \"lessThan\": \"dc5ead0e8fc5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dfeae619d781\", \"lessThan\": \"6a6730812220\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dfeae619d781\", \"lessThan\": \"7d3b793faaab\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/tty/serial/sc16is7xx.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.16\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.16\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.120\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.64\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/tty/serial/sc16is7xx.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/cc6a3f35bc9b3a8da1b195420a2e8d9fdadfa831\"}, {\"url\": \"https://git.kernel.org/stable/c/dc5ead0e8fc5ef53b8553394d4aab60c277976b3\"}, {\"url\": \"https://git.kernel.org/stable/c/6a6730812220a9a5ce4003eb347da1ee5abd06b0\"}, {\"url\": \"https://git.kernel.org/stable/c/7d3b793faaab1305994ce568b59d61927235f57b\"}], \"x_generator\": {\"engine\": \"bippy-8e903de6a542\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nserial: sc16is7xx: fix invalid FIFO access with special register set\\n\\nWhen enabling access to the special register set, Receiver time-out and\\nRHR interrupts can happen. In this case, the IRQ handler will try to read\\nfrom the FIFO thru the RHR register at address 0x00, but address 0x00 is\\nmapped to DLL register, resulting in erroneous FIFO reading.\\n\\nCall graph example:\\n    sc16is7xx_startup(): entry\\n    sc16is7xx_ms_proc(): entry\\n    sc16is7xx_set_termios(): entry\\n    sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set\\n    sc16is7xx_port_irq() entry            --> IIR is 0x0C\\n    sc16is7xx_handle_rx() entry\\n    sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is\\n                               mapped to DLL (LCR=LCR_CONF_MODE_A)\\n    sc16is7xx_set_baud(): exit --> Restore access to general register set\\n\\nFix the problem by claiming the efr_lock mutex when accessing the Special\\nregister set.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-14T20:51:59.565Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-44950\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-14T20:51:59.565Z\", \"dateReserved\": \"2024-08-21T05:34:56.665Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-04T18:35:50.602Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.