Bug 2300459 (CVE-2024-41082) - CVE-2024-41082 kernel: nvme-fabrics: use reserved tag for reg read/write command
Summary: CVE-2024-41082 kernel: nvme-fabrics: use reserved tag for reg read/write command
Keywords:
Status: NEW
Alias: CVE-2024-41082
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2301658
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-29 15:52 UTC by OSIDB Bzimport
Modified: 2024-08-19 05:21 UTC (History)
4 users (show)

Fixed In Version: kernel 6.9.11, kernel 6.10
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-07-29 15:52:04 UTC
In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: use reserved tag for reg read/write command

In some scenarios, if too many commands are issued by nvme command in
the same time by user tasks, this may exhaust all tags of admin_q. If
a reset (nvme reset or IO timeout) occurs before these commands finish,
reconnect routine may fail to update nvme regs due to insufficient tags,
which will cause kernel hang forever. In order to workaround this issue,
maybe we can let reg_read32()/reg_read64()/reg_write32() use reserved
tags. This maybe safe for nvmf:

1. For the disable ctrl path,  we will not issue connect command
2. For the enable ctrl / fw activate path, since connect and reg_xx()
   are called serially.

So the reserved tags may still be enough while reg_xx() use reserved tags.

Comment 1 Mauro Matteo Cascella 2024-07-30 14:57:55 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024072926-CVE-2024-41082-6e0a@gregkh/T

Comment 2 Mauro Matteo Cascella 2024-07-30 14:58:16 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2301658]


Note You need to log in before you can comment on or make changes to this bug.