Bug 1221269 (CVE-2023-52498)

Summary: VUL-0: CVE-2023-52498: kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Thomas Renninger <trenn>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: ivan.ivanov, rfrohl, vasant.karasulli
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/397137/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-03-12 08:18:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

PM: sleep: Fix possible deadlocks in core system-wide PM code

It is reported that in low-memory situations the system-wide resume core
code deadlocks, because async_schedule_dev() executes its argument
function synchronously if it cannot allocate memory (and not only in
that case) and that function attempts to acquire a mutex that is already
held.  Executing the argument function synchronously from within
dpm_async_fn() may also be problematic for ordering reasons (it may
cause a consumer device's resume callback to be invoked before a
requisite supplier device's one, for example).

Address this by changing the code in question to use
async_schedule_dev_nocall() for scheduling the asynchronous
execution of device suspend and resume functions and to directly
run them synchronously if async_schedule_dev_nocall() returns false.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52498
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
https://www.cve.org/CVERecord?id=CVE-2023-52498
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
https://bugzilla.redhat.com/show_bug.cgi?id=2269063
Comment 16 Thomas Renninger 2024-05-07 09:23:50 UTC
I had 3 days off last week, looks like Oliver already added the patch (for SLE 15 SP6 and ALP)

The stable submissions shows that this is needed in kernels 5.7+, means we would need this in SLE 15 SP5 as well.