Bug 1220450 (CVE-2024-26606) - VUL-0: CVE-2024-26606: kernel: binder: signal epoll threads of self-work
Summary: VUL-0: CVE-2024-26606: kernel: binder: signal epoll threads of self-work
Status: RESOLVED INVALID
Alias: CVE-2024-26606
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/395190/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-27 13:42 UTC by SMASH SMASH
Modified: 2024-07-09 07:48 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-02-27 13:42:52 UTC
In the Linux kernel, the following vulnerability has been resolved:

binder: signal epoll threads of self-work

In (e)poll mode, threads often depend on I/O events to determine when
data is ready for consumption. Within binder, a thread may initiate a
command via BINDER_WRITE_READ without a read buffer and then make use
of epoll_wait() or similar to consume any responses afterwards.

It is then crucial that epoll threads are signaled via wakeup when they
queue their own work. Otherwise, they risk waiting indefinitely for an
event leaving their work unhandled. What is worse, subsequent commands
won't trigger a wakeup either as the thread has pending work.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26606
https://www.cve.org/CVERecord?id=CVE-2024-26606
https://lore.kernel.org/linux-cve-announce/2024022620-CVE-2024-26606-64b6@gregkh/T/#u

Patch:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=97830f3c3088638ff90b20dfba2eb4d487bf14d7
Comment 1 Andrea Mattiazzo 2024-02-27 13:43:21 UTC
Closing since all code streams are not affected.