CVE-2024-36936

CVE Details

Release Date:2024-05-30

Description


In the Linux kernel, the following vulnerability has been resolved:\nefi/unaccepted: touch soft lockup during memory accept\nCommit 50e782a86c98 ('efi/unaccepted: Fix soft lockups caused by\nparallel memory acceptance') has released the spinlock so other CPUs can\ndo memory acceptance in parallel and not triggers softlockup on other\nCPUs.\nHowever the softlock up was intermittent shown up if the memory of the\nTD guest is large, and the timeout of softlockup is set to 1 second:\nRIP: 0010:_raw_spin_unlock_irqrestore\nCall Trace:\n? __hrtimer_run_queues\n\n? hrtimer_interrupt\n? watchdog_timer_fn\n? __sysvec_apic_timer_interrupt\n? __pfx_watchdog_timer_fn\n? sysvec_apic_timer_interrupt\n\n? __hrtimer_run_queues\n\n? hrtimer_interrupt\n? asm_sysvec_apic_timer_interrupt\n? _raw_spin_unlock_irqrestore\n? __sysvec_apic_timer_interrupt\n? sysvec_apic_timer_interrupt\naccept_memory\ntry_to_accept_memory\ndo_huge_pmd_anonymous_page\nget_page_from_freelist\n__handle_mm_fault\n__alloc_pages\n__folio_alloc\n? __tdx_hypercall\nhandle_mm_fault\nvma_alloc_folio\ndo_user_addr_fault\ndo_huge_pmd_anonymous_page\nexc_page_fault\n? __do_huge_pmd_anonymous_page\nasm_exc_page_fault\n__handle_mm_fault\nWhen the local irq is enabled at the end of accept_memory(), the\nsoftlockup detects that the watchdog on single CPU has not been fed for\na while. That is to say, even other CPUs will not be blocked by\nspinlock, the current CPU might be stunk with local irq disabled for a\nwhile, which hurts not only nmi watchdog but also softlockup.\nChao Gao pointed out that the memory accept could be time costly and\nthere was similar report before. Thus to avoid any softlocup detection\nduring this stage, give the softlockup a flag to skip the timeout check\nat the end of accept_memory(), by invoking touch_softlockup_watchdog().

See more information about CVE-2024-36936 from MITRE CVE dictionary and NIST NVD


CVSS Scoring


NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.

Base Score: 5.5 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector: Local network Attack Complexity: Low
Privileges Required: Low User Interaction: None
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: None Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 9 (kernel)ELSA-2024-93152024-11-14


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete