Bug 2327175 (CVE-2024-50274) - CVE-2024-50274 kernel: idpf: avoid vport access in idpf_get_link_ksettings
Summary: CVE-2024-50274 kernel: idpf: avoid vport access in idpf_get_link_ksettings
Keywords:
Status: NEW
Alias: CVE-2024-50274
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2327245
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-19 02:01 UTC by OSIDB Bzimport
Modified: 2024-12-18 11:50 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-11-19 02:01:51 UTC
In the Linux kernel, the following vulnerability has been resolved:

idpf: avoid vport access in idpf_get_link_ksettings

When the device control plane is removed or the platform
running device control plane is rebooted, a reset is detected
on the driver. On driver reset, it releases the resources and
waits for the reset to complete. If the reset fails, it takes
the error path and releases the vport lock. At this time if the
monitoring tools tries to access link settings, it call traces
for accessing released vport pointer.

To avoid it, move link_speed_mbps to netdev_priv structure
which removes the dependency on vport pointer and the vport lock
in idpf_get_link_ksettings. Also use netif_carrier_ok()
to check the link status and adjust the offsetof to use link_up
instead of link_speed_mbps.

Comment 1 Avinash Hanwate 2024-11-19 05:47:16 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-50274-a441@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.