Bug 1226955 (CVE-2024-39292) - VUL-0: CVE-2024-39292: kernel: um: add winch to winch_handlers before registering winch IRQ
Summary: VUL-0: CVE-2024-39292: kernel: um: add winch to winch_handlers before registe...
Status: RESOLVED INVALID
Alias: CVE-2024-39292
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/411975/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-39292:4.7:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-06-25 12:00 UTC by SMASH SMASH
Modified: 2024-06-27 12:25 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-06-25 12:00:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

um: Add winch to winch_handlers before registering winch IRQ

Registering a winch IRQ is racy, an interrupt may occur before the winch is
added to the winch_handlers list.

If that happens, register_winch_irq() adds to that list a winch that is
scheduled to be (or has already been) freed, causing a panic later in
winch_cleanup().

Avoid the race by adding the winch to the winch_handlers list before
registering the IRQ, and rolling back if um_request_irq() fails.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-39292
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-39292.mbox
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101
https://www.cve.org/CVERecord?id=CVE-2024-39292
Comment 1 Michal Hocko 2024-06-27 12:24:03 UTC
We do not enable UML