CVE-2024-42287

CVE Details

Release Date:2024-08-17

Description


In the Linux kernel, the following vulnerability has been resolved:\nscsi: qla2xxx: Complete command early within lock\nA crash was observed while performing NPIV and FW reset,\nBUG: kernel NULL pointer dereference, address: 000000000000001c\n#PF: supervisor read access in kernel mode\n#PF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nOops: 0000 1 PREEMPT_RT SMP NOPTI\nRIP: 0010:dma_direct_unmap_sg+0x51/0x1e0\nRSP: 0018:ffffc90026f47b88 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000002\nRDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8881041130d0\nRBP: ffff8881041130d0 R08: 0000000000000000 R09: 0000000000000034\nR10: ffffc90026f47c48 R11: 0000000000000031 R12: 0000000000000000\nR13: 0000000000000000 R14: ffff8881565e4a20 R15: 0000000000000000\nFS: 00007f4c69ed3d00(0000) GS:ffff889faac80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000001c CR3: 0000000288a50002 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\n? __die_body+0x1a/0x60\n? page_fault_oops+0x16f/0x4a0\n? do_user_addr_fault+0x174/0x7f0\n? exc_page_fault+0x69/0x1a0\n? asm_exc_page_fault+0x22/0x30\n? dma_direct_unmap_sg+0x51/0x1e0\n? preempt_count_sub+0x96/0xe0\nqla2xxx_qpair_sp_free_dma+0x29f/0x3b0 [qla2xxx]\nqla2xxx_qpair_sp_compl+0x60/0x80 [qla2xxx]\n__qla2x00_abort_all_cmds+0xa2/0x450 [qla2xxx]\nThe command completion was done early while aborting the commands in driver\nunload path but outside lock to avoid the WARN_ON condition of performing\ndma_free_attr within the lock. However this caused race condition while\ncommand completion via multiple paths causing system crash.\nHence complete the command early in unload path but within the lock to\navoid race condition.

See more information about CVE-2024-42287 from MITRE CVE dictionary and NIST NVD


CVSS Scoring


NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.

Base Score: 4.7 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector: Local network Attack Complexity: High
Privileges Required: Low User Interaction: None
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: None Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (kernel-uek)ELSA-2024-127802024-10-11
Oracle Linux version 7 (kernel-uek)ELSA-2024-127822024-10-14
Oracle Linux version 8 (kernel-uek)ELSA-2024-126822024-09-23
Oracle Linux version 8 (kernel-uek)ELSA-2024-127802024-10-11
Oracle Linux version 8 (kernel-uek)ELSA-2024-127822024-10-14
Oracle Linux version 9 (kernel-uek)ELSA-2024-126822024-09-23


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete