cve-2024-36936
Vulnerability from cvelistv5
Published
2024-05-30 15:29
Modified
2024-08-02 03:43
Severity
Summary
efi/unaccepted: touch soft lockup during memory accept
Impacted products
VendorProduct
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36936",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-12T19:14:06.800588Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-12T19:14:21.422Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:43:50.123Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1c5a1627f48105cbab81d25ec2f72232bfaa8185"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/firmware/efi/unaccepted_memory.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "781e34b73601",
              "status": "affected",
              "version": "50e782a86c98",
              "versionType": "git"
            },
            {
              "lessThan": "1c5a1627f481",
              "status": "affected",
              "version": "50e782a86c98",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/firmware/efi/unaccepted_memory.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.10",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi/unaccepted: touch soft lockup during memory accept\n\nCommit 50e782a86c98 (\"efi/unaccepted: Fix soft lockups caused by\nparallel memory acceptance\") has released the spinlock so other CPUs can\ndo memory acceptance in parallel and not triggers softlockup on other\nCPUs.\n\nHowever the softlock up was intermittent shown up if the memory of the\nTD guest is large, and the timeout of softlockup is set to 1 second:\n\n RIP: 0010:_raw_spin_unlock_irqrestore\n Call Trace:\n ? __hrtimer_run_queues\n \u003cIRQ\u003e\n ? hrtimer_interrupt\n ? watchdog_timer_fn\n ? __sysvec_apic_timer_interrupt\n ? __pfx_watchdog_timer_fn\n ? sysvec_apic_timer_interrupt\n \u003c/IRQ\u003e\n ? __hrtimer_run_queues\n \u003cTASK\u003e\n ? hrtimer_interrupt\n ? asm_sysvec_apic_timer_interrupt\n ? _raw_spin_unlock_irqrestore\n ? __sysvec_apic_timer_interrupt\n ? sysvec_apic_timer_interrupt\n accept_memory\n try_to_accept_memory\n do_huge_pmd_anonymous_page\n get_page_from_freelist\n __handle_mm_fault\n __alloc_pages\n __folio_alloc\n ? __tdx_hypercall\n handle_mm_fault\n vma_alloc_folio\n do_user_addr_fault\n do_huge_pmd_anonymous_page\n exc_page_fault\n ? __do_huge_pmd_anonymous_page\n asm_exc_page_fault\n __handle_mm_fault\n\nWhen the local irq is enabled at the end of accept_memory(), the\nsoftlockup detects that the watchdog on single CPU has not been fed for\na while. That is to say, even other CPUs will not be blocked by\nspinlock, the current CPU might be stunk with local irq disabled for a\nwhile, which hurts not only nmi watchdog but also softlockup.\n\nChao Gao pointed out that the memory accept could be time costly and\nthere was similar report before. Thus to avoid any softlocup detection\nduring this stage, give the softlockup a flag to skip the timeout check\nat the end of accept_memory(), by invoking touch_softlockup_watchdog()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-30T15:29:25.767Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81"
        },
        {
          "url": "https://git.kernel.org/stable/c/1c5a1627f48105cbab81d25ec2f72232bfaa8185"
        }
      ],
      "title": "efi/unaccepted: touch soft lockup during memory accept",
      "x_generator": {
        "engine": "bippy-a5840b7849dd"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-36936",
    "datePublished": "2024-05-30T15:29:25.767Z",
    "dateReserved": "2024-05-30T15:25:07.071Z",
    "dateUpdated": "2024-08-02T03:43:50.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36936\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-30T16:15:16.713\",\"lastModified\":\"2024-05-30T18:18:58.870\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nefi/unaccepted: touch soft lockup during memory accept\\n\\nCommit 50e782a86c98 (\\\"efi/unaccepted: Fix soft lockups caused by\\nparallel memory acceptance\\\") has released the spinlock so other CPUs can\\ndo memory acceptance in parallel and not triggers softlockup on other\\nCPUs.\\n\\nHowever the softlock up was intermittent shown up if the memory of the\\nTD guest is large, and the timeout of softlockup is set to 1 second:\\n\\n RIP: 0010:_raw_spin_unlock_irqrestore\\n Call Trace:\\n ? __hrtimer_run_queues\\n \u003cIRQ\u003e\\n ? hrtimer_interrupt\\n ? watchdog_timer_fn\\n ? __sysvec_apic_timer_interrupt\\n ? __pfx_watchdog_timer_fn\\n ? sysvec_apic_timer_interrupt\\n \u003c/IRQ\u003e\\n ? __hrtimer_run_queues\\n \u003cTASK\u003e\\n ? hrtimer_interrupt\\n ? asm_sysvec_apic_timer_interrupt\\n ? _raw_spin_unlock_irqrestore\\n ? __sysvec_apic_timer_interrupt\\n ? sysvec_apic_timer_interrupt\\n accept_memory\\n try_to_accept_memory\\n do_huge_pmd_anonymous_page\\n get_page_from_freelist\\n __handle_mm_fault\\n __alloc_pages\\n __folio_alloc\\n ? __tdx_hypercall\\n handle_mm_fault\\n vma_alloc_folio\\n do_user_addr_fault\\n do_huge_pmd_anonymous_page\\n exc_page_fault\\n ? __do_huge_pmd_anonymous_page\\n asm_exc_page_fault\\n __handle_mm_fault\\n\\nWhen the local irq is enabled at the end of accept_memory(), the\\nsoftlockup detects that the watchdog on single CPU has not been fed for\\na while. That is to say, even other CPUs will not be blocked by\\nspinlock, the current CPU might be stunk with local irq disabled for a\\nwhile, which hurts not only nmi watchdog but also softlockup.\\n\\nChao Gao pointed out that the memory accept could be time costly and\\nthere was similar report before. Thus to avoid any softlocup detection\\nduring this stage, give the softlockup a flag to skip the timeout check\\nat the end of accept_memory(), by invoking touch_softlockup_watchdog().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: efi/unaccepted: toque el bloqueo suave durante la aceptaci\u00f3n de la memoria. El commit 50e782a86c98 (\\\"efi/unaccepted: solucione los bloqueos suaves causados por la aceptaci\u00f3n de la memoria paralela\\\") ha liberado el bloqueo de giro para que otras CPU puedan usar la memoria. aceptaci\u00f3n en paralelo y no activa el bloqueo suave en otras CPU. Sin embargo, el bloqueo suave se mostr\u00f3 de forma intermitente si la memoria del TD invitado es grande y el tiempo de espera del bloqueo suave se establece en 1 segundo: RIP: 0010:_raw_spin_unlock_irqrestore Seguimiento de llamadas:? __hrtimer_run_queues ? hrtimer_interrupt? watchdog_timer_fn? __sysvec_apic_timer_interrupt? __pfx_watchdog_timer_fn? sysvec_apic_timer_interrupt  ? __hrtimer_run_queues ? hrtimer_interrupt? asm_sysvec_apic_timer_interrupt? _raw_spin_unlock_irqrestore? __sysvec_apic_timer_interrupt? sysvec_apic_timer_interrupt aceptar_memoria try_to_accept_memory do_huge_pmd_anonymous_page get_page_from_freelist __handle_mm_fault __alloc_pages __folio_alloc? __tdx_hypercall handle_mm_fault vma_alloc_folio do_user_addr_fault do_huge_pmd_anonymous_page exc_page_fault? __do_huge_pmd_anonymous_page asm_exc_page_fault __handle_mm_fault Cuando el irq local est\u00e1 habilitado al final de Accept_memory(), el bloqueo suave detecta que el mecanismo de vigilancia en una sola CPU no ha sido alimentado por un tiempo. Es decir, incluso otras CPU no ser\u00e1n bloqueadas por spinlock, la CPU actual podr\u00eda apestar con el irq local deshabilitado por un tiempo, lo que perjudica no solo al nmi watchdog sino tambi\u00e9n al softlockup. Chao Gao se\u00f1al\u00f3 que la aceptaci\u00f3n de la memoria podr\u00eda llevar mucho tiempo y hubo un informe similar antes. Por lo tanto, para evitar cualquier detecci\u00f3n de softlocup durante esta etapa, proporcione al softlockup una bandera para omitir la verificaci\u00f3n del tiempo de espera al final de Accept_memory(), invocando touch_softlockup_watchdog().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1c5a1627f48105cbab81d25ec2f72232bfaa8185\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...