Bug 2301500 (CVE-2024-42135)

Summary: CVE-2024-42135 kernel: vhost_task: Handle SIGKILL by flushing work and exiting
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dfreiber, drow, jburrell, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 6.6.39, kernel 6.9.9, kernel 6.10 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was discovered in the Linux kernel's vhost driver where the improper handling of SIGKILL signals can leave vhost workers lingering or performing unintended operations even after receiving the kill signal. This can lead to system instability or crashes.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2301993    
Bug Blocks:    

Description OSIDB Bzimport 2024-07-30 08:36:31 UTC
In the Linux kernel, the following vulnerability has been resolved:

vhost_task: Handle SIGKILL by flushing work and exiting

Instead of lingering until the device is closed, this has us handle
SIGKILL by:

1. marking the worker as killed so we no longer try to use it with
   new virtqueues and new flush operations.
2. setting the virtqueue to worker mapping so no new works are queued.
3. running all the exiting works.

Comment 1 Mauro Matteo Cascella 2024-07-31 10:00:00 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024073029-CVE-2024-42135-0694@gregkh/T

Comment 2 Mauro Matteo Cascella 2024-07-31 10:00:21 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2301993]