Bug 1226741 (CVE-2024-38595) - VUL-0: CVE-2024-38595: kernel: net/mlx5: fix peer devlink set for SF representor devlink port
Summary: VUL-0: CVE-2024-38595: kernel: net/mlx5: fix peer devlink set for SF represen...
Status: RESOLVED FIXED
Alias: CVE-2024-38595
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/411415/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-38595:2.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-06-21 11:16 UTC by SMASH SMASH
Modified: 2024-07-08 15:12 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-06-21 11:16:03 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix peer devlink set for SF representor devlink port

The cited patch change register devlink flow, and neglect to reflect
the changes for peer devlink set logic. Peer devlink set is
triggering a call trace if done after devl_register.[1]

Hence, align peer devlink set logic with register devlink flow.

[1]
WARNING: CPU: 4 PID: 3394 at net/devlink/core.c:155 devlink_rel_nested_in_add+0x177/0x180
CPU: 4 PID: 3394 Comm: kworker/u40:1 Not tainted 6.9.0-rc4_for_linust_min_debug_2024_04_16_14_08 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_vhca_event0 mlx5_vhca_state_work_handler [mlx5_core]
RIP: 0010:devlink_rel_nested_in_add+0x177/0x180
Call Trace:
 <TASK>
 ? __warn+0x78/0x120
 ? devlink_rel_nested_in_add+0x177/0x180
 ? report_bug+0x16d/0x180
 ? handle_bug+0x3c/0x60
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? devlink_port_init+0x30/0x30
 ? devlink_port_type_clear+0x50/0x50
 ? devlink_rel_nested_in_add+0x177/0x180
 ? devlink_rel_nested_in_add+0xdd/0x180
 mlx5_sf_mdev_event+0x74/0xb0 [mlx5_core]
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_sf_dev_probe+0x185/0x3e0 [mlx5_core]
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc5/0x3a0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x64f/0x860
 __auxiliary_device_add+0x3b/0xa0
 mlx5_sf_dev_add+0x139/0x330 [mlx5_core]
 mlx5_sf_dev_state_change_handler+0x1e4/0x250 [mlx5_core]
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_vhca_state_work_handler+0x151/0x200 [mlx5_core]
 process_one_work+0x13f/0x2e0
 worker_thread+0x2bd/0x3c0
 ? rescuer_thread+0x410/0x410
 kthread+0xc4/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x2d/0x50
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork_asm+0x11/0x20
 </TASK>

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-38595
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-38595.mbox
https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213
https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d
https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0
https://www.cve.org/CVERecord?id=CVE-2024-38595
https://bugzilla.redhat.com/show_bug.cgi?id=2293374
Comment 1 Gabriel Krisman Bertazi 2024-06-21 15:15:13 UTC
Alll branches fixed. returning to security team.

3c453e8cc672 ("net/mlx5: Fix peer devlink set for SF representor devlink port") merged vfs-6.10-rc2.fixes~48^2~32^2~3
Fixes: bf729988303a ("net/mlx5: Restore mistakenly dropped parts in register devlink flow") merged v6.9-rc5~26^2~17^2~3
Fixes: c6e77aa9dd82 ("net/mlx5: Register devlink first under devlink lock") merged v6.9-rc4~27^2~7^2~9
Security fix for CVE-2024-38595 bsc#1226741 with CVSS 3.3
Experts candidates: tbogendoerfer@suse.de denis.kirjanov@suse.com 
..........................
NO ACTION NEEDED: All relevant branches contain the fix!