cve-2024-56694
Vulnerability from cvelistv5
Published
2024-12-28 09:46
Modified
2025-01-20 06:26
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: bpf: fix recursive lock when verdict program return SK_PASS When the stream_verdict program returns SK_PASS, it places the received skb into its own receive queue, but a recursive lock eventually occurs, leading to an operating system deadlock. This issue has been present since v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&sk->sk_callback_lock) strp_data_ready strp_read_sock read_sock -> tcp_read_sock strp_recv cb.rcv_msg -> sk_psock_strp_read # now stream_verdict return SK_PASS without peer sock assign __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&sk->sk_callback_lock) <= dead lock ''' This topic has been discussed before, but it has not been fixed. Previous discussion: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch
Impacted products
Vendor Product Version
Linux Linux Version: 6648e613226e18897231ab5e42ffc29e63fa3365
Version: c0809c128dad4c3413818384eb06a341633db973
Version: 5965bc7535fb87510b724e5465ccc1a1cf00916d
Version: 39dc9e1442385d6e9be0b6491ee488dddd55ae27
Version: b397a0ab8582c533ec0c6b732392f141fc364f87
Version: 6648e613226e18897231ab5e42ffc29e63fa3365
Version: 6648e613226e18897231ab5e42ffc29e63fa3365
Version: 6648e613226e18897231ab5e42ffc29e63fa3365
Create a notification for this product.
   Linux Linux Version: 6.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/core/skmsg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "078f7e1521442a55db4bed812a2fbaf02ac33819",
              "status": "affected",
              "version": "6648e613226e18897231ab5e42ffc29e63fa3365",
              "versionType": "git"
            },
            {
              "lessThan": "221109ba2127eabd0aa64718543638b58b15df56",
              "status": "affected",
              "version": "c0809c128dad4c3413818384eb06a341633db973",
              "versionType": "git"
            },
            {
              "lessThan": "6694f7acd625ed854bf6342926e771d65dad7f69",
              "status": "affected",
              "version": "5965bc7535fb87510b724e5465ccc1a1cf00916d",
              "versionType": "git"
            },
            {
              "lessThan": "386efa339e08563dd33e83bc951aea5d407fe578",
              "status": "affected",
              "version": "39dc9e1442385d6e9be0b6491ee488dddd55ae27",
              "versionType": "git"
            },
            {
              "lessThan": "da2bc8a0c8f3ac66fdf980fc59936f851a083561",
              "status": "affected",
              "version": "b397a0ab8582c533ec0c6b732392f141fc364f87",
              "versionType": "git"
            },
            {
              "lessThan": "01f1b88acfd79103da0610b45471f6c88ea98d72",
              "status": "affected",
              "version": "6648e613226e18897231ab5e42ffc29e63fa3365",
              "versionType": "git"
            },
            {
              "lessThan": "f84c5ef6ca23cc2f72f3b830d74f67944684bb05",
              "status": "affected",
              "version": "6648e613226e18897231ab5e42ffc29e63fa3365",
              "versionType": "git"
            },
            {
              "lessThan": "8ca2a1eeadf09862190b2810697702d803ceef2d",
              "status": "affected",
              "version": "6648e613226e18897231ab5e42ffc29e63fa3365",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/core/skmsg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.9"
            },
            {
              "lessThan": "6.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.289",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.233",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.174",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.120",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.64",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix recursive lock when verdict program return SK_PASS\n\nWhen the stream_verdict program returns SK_PASS, it places the received skb\ninto its own receive queue, but a recursive lock eventually occurs, leading\nto an operating system deadlock. This issue has been present since v6.9.\n\n\u0027\u0027\u0027\nsk_psock_strp_data_ready\n    write_lock_bh(\u0026sk-\u003esk_callback_lock)\n    strp_data_ready\n      strp_read_sock\n        read_sock -\u003e tcp_read_sock\n          strp_recv\n            cb.rcv_msg -\u003e sk_psock_strp_read\n              # now stream_verdict return SK_PASS without peer sock assign\n              __SK_PASS = sk_psock_map_verd(SK_PASS, NULL)\n              sk_psock_verdict_apply\n                sk_psock_skb_ingress_self\n                  sk_psock_skb_ingress_enqueue\n                    sk_psock_data_ready\n                      read_lock_bh(\u0026sk-\u003esk_callback_lock) \u003c= dead lock\n\n\u0027\u0027\u0027\n\nThis topic has been discussed before, but it has not been fixed.\nPrevious discussion:\nhttps://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-20T06:26:21.163Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819"
        },
        {
          "url": "https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56"
        },
        {
          "url": "https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69"
        },
        {
          "url": "https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578"
        },
        {
          "url": "https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561"
        },
        {
          "url": "https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72"
        },
        {
          "url": "https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05"
        },
        {
          "url": "https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d"
        }
      ],
      "title": "bpf: fix recursive lock when verdict program return SK_PASS",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-56694",
    "datePublished": "2024-12-28T09:46:18.826Z",
    "dateReserved": "2024-12-27T15:00:39.849Z",
    "dateUpdated": "2025-01-20T06:26:21.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-56694\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-28T10:15:15.203\",\"lastModified\":\"2025-01-09T16:16:23.053\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbpf: fix recursive lock when verdict program return SK_PASS\\n\\nWhen the stream_verdict program returns SK_PASS, it places the received skb\\ninto its own receive queue, but a recursive lock eventually occurs, leading\\nto an operating system deadlock. This issue has been present since v6.9.\\n\\n\u0027\u0027\u0027\\nsk_psock_strp_data_ready\\n    write_lock_bh(\u0026sk-\u003esk_callback_lock)\\n    strp_data_ready\\n      strp_read_sock\\n        read_sock -\u003e tcp_read_sock\\n          strp_recv\\n            cb.rcv_msg -\u003e sk_psock_strp_read\\n              # now stream_verdict return SK_PASS without peer sock assign\\n              __SK_PASS = sk_psock_map_verd(SK_PASS, NULL)\\n              sk_psock_verdict_apply\\n                sk_psock_skb_ingress_self\\n                  sk_psock_skb_ingress_enqueue\\n                    sk_psock_data_ready\\n                      read_lock_bh(\u0026sk-\u003esk_callback_lock) \u003c= dead lock\\n\\n\u0027\u0027\u0027\\n\\nThis topic has been discussed before, but it has not been fixed.\\nPrevious discussion:\\nhttps://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: se corrige el bloqueo recursivo cuando el programa de veredicto devuelve SK_PASS Cuando el programa stream_verdict devuelve SK_PASS, coloca el skb recibido en su propia cola de recepci\u00f3n, pero finalmente se produce un bloqueo recursivo que provoca un bloqueo del sistema operativo. Este problema ha estado presente desde la versi\u00f3n v6.9. \u0027\u0027\u0027 sk_psock_strp_data_ready write_lock_bh(\u0026amp;sk-\u0026gt;sk_callback_lock) strp_data_ready strp_read_sock read_sock -\u0026gt; tcp_read_sock strp_recv cb.rcv_msg -\u0026gt; sk_psock_strp_read # ahora stream_verdict devuelve SK_PASS sin asignaci\u00f3n de sock de pares __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(\u0026amp;sk-\u0026gt;sk_callback_lock) \u0026lt;= bloqueo muerto \u0027\u0027\u0027 Este tema se ha discutido antes, pero no se ha solucionado. Discusi\u00f3n anterior: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.223\",\"versionEndExcluding\":\"5.11\",\"matchCriteriaId\":\"CA30912E-AC28-4CAA-B0BF-82A5ABF6555D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.159\",\"versionEndExcluding\":\"5.15.174\",\"matchCriteriaId\":\"AE68EECA-B500-4C8F-BA03-6297422D3BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.91\",\"versionEndExcluding\":\"6.1.120\",\"matchCriteriaId\":\"D7525FB8-F6DA-4FBF-A1B7-66F009E2F1FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.31\",\"versionEndExcluding\":\"6.6.64\",\"matchCriteriaId\":\"C14BE86F-46F8-45CE-942E-3CB49D3AAB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.8.10\",\"versionEndExcluding\":\"6.11.11\",\"matchCriteriaId\":\"DC02F628-9D7C-48E7-93BD-4A25BD2C74CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12\",\"versionEndExcluding\":\"6.12.2\",\"matchCriteriaId\":\"D8882B1B-2ABC-4838-AC1D-DBDBB5764776\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.