Bug 1227830 (CVE-2024-40995) - VUL-0: CVE-2024-40995: kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
Summary: VUL-0: CVE-2024-40995: kernel: net/sched: act_api: fix possible infinite loop...
Status: NEW
Alias: CVE-2024-40995
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Davide Benini
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/413922/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40995:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-15 13:38 UTC by SMASH SMASH
Modified: 2024-07-17 16:27 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-15 13:38:17 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()

syzbot found hanging tasks waiting on rtnl_lock [1]

A reproducer is available in the syzbot bug.

When a request to add multiple actions with the same index is sent, the
second request will block forever on the first request. This holds
rtnl_lock, and causes tasks to hang.

Return -EAGAIN to prevent infinite looping, while keeping documented
behavior.

[1]

INFO: task kworker/1:0:5088 blocked for more than 143 seconds.
Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
<TASK>
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6746
__schedule_loop kernel/sched/core.c:6823 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6838
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5953 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40995
https://www.cve.org/CVERecord?id=CVE-2024-40995
https://git.kernel.org/stable/c/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74
https://git.kernel.org/stable/c/25987a97eec4d5f897cd04ee1b45170829c610da
https://git.kernel.org/stable/c/5f926aa96b08b6c47178fe1171e7ae331c695fc2
https://git.kernel.org/stable/c/6fc78d67f51aeb9a542d39a8714e16bc411582d4
https://git.kernel.org/stable/c/7a0e497b597df7c4cf2b63fc6e9188b6cabe5335
https://git.kernel.org/stable/c/c6a7da65a296745535a964be1019ec7691b0cb90
https://git.kernel.org/stable/c/d864319871b05fadd153e0aede4811ca7008f5d6
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40995.mbox