|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-26686: kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | mhocko, mkoutny, rfrohl |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/400158/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2024-26686:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-04-08 07:54:04 UTC
There is a similar fix for gerusage and likely more because depending on the kernel version we are iterating over all threads with the siglock or other internal state locks with IRQ disabled. While this is far from ideal and while this might cause performance bottlenecks I highly doubt this is security relevant problem because that would require 2 conditions to be fullfilled - an untrusted user would need to be allowed to spawn uncontrolled number of user threads/processes. That alone is a DoS vector. As per https://lore.kernel.org/all/CADBMgpz7k=LhktfcJhSDBDWN0oLeQxPqhOVws3fq0LNpnfOSYg@mail.gmail.com/ the getrusage path requires ~250K threads to reliably produce the lockup which is beyond reasonable - hardlockup detector is not configured to panic the system by default - nor this is a recommended configuration. All that being said this could be considered a scalability improvement rather than a security threat. I would just close this as WONTFIX until we have a real bug report where either do_task_stat or getrusage turn out to be real performance bottlenecks. |