In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix missing lock on sync reset reload
On sync reset reload work, when remote host updates devlink on reload actions performed on that host, it misses taking devlink lock before calling devlinkremotereloadactionsperformed() which results in triggering lock assert like the following:
WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devlassertlocked+0x3e/0x50 … CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116 Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015 Workqueue: mlx5fwresetevents mlx5syncresetreloadwork [mlx5core] RIP: 0010:devlassertlocked+0x3e/0x50 … Call Trace: <TASK> ? _warn+0xa4/0x210 ? devlassertlocked+0x3e/0x50 ? reportbug+0x160/0x280 ? handlebug+0x3f/0x80 ? excinvalidop+0x17/0x40 ? asmexcinvalidop+0x1a/0x20 ? devlassertlocked+0x3e/0x50 devlinknotify+0x88/0x2b0 ? mlx5attachdevice+0x20c/0x230 [mlx5core] ? _pfxdevlinknotify+0x10/0x10 ? processonework+0x4b6/0xbb0 processone_work+0x4b6/0xbb0 […]
{ "vanir_signatures": [ { "signature_type": "Function", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c", "function": "mlx5_fw_reset_complete_reload" }, "id": "CVE-2024-42268-11d4d6de", "digest": { "length": 534.0, "function_hash": "57857531034205160444032347229866246498" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98884e89c90d077f6fe6ba18e6cf6f914642f04e", "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c" }, "id": "CVE-2024-42268-25f8d25f", "digest": { "threshold": 0.9, "line_hashes": [ "168717814970989042424667023801057682165", "137049616593910190076951174040003836201", "15340648569882155234970266493050235575", "204921897991262158371862972285466219527", "151694173740524359518651298947649492564", "264150447084997682606836082644682092084", "287753503035729093958269293000545068148", "307523271645099140668153680662108969524", "220147456312676611869346044083842734292", "327228937410587257821093229544540493170" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@572f9caa9e7295f8c8822e4122c7ae8f1c412ff9", "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c", "function": "mlx5_fw_reset_complete_reload" }, "id": "CVE-2024-42268-3e215e1e", "digest": { "length": 534.0, "function_hash": "57857531034205160444032347229866246498" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5", "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c" }, "id": "CVE-2024-42268-7a59ddc6", "digest": { "threshold": 0.9, "line_hashes": [ "168717814970989042424667023801057682165", "137049616593910190076951174040003836201", "15340648569882155234970266493050235575", "204921897991262158371862972285466219527", "151694173740524359518651298947649492564", "264150447084997682606836082644682092084", "287753503035729093958269293000545068148", "307523271645099140668153680662108969524", "220147456312676611869346044083842734292", "327228937410587257821093229544540493170" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98884e89c90d077f6fe6ba18e6cf6f914642f04e", "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c" }, "id": "CVE-2024-42268-813f8824", "digest": { "threshold": 0.9, "line_hashes": [ "299304280003286976954366069795664603200", "233243760896341707624810282582526452354", "15340648569882155234970266493050235575", "204921897991262158371862972285466219527", "151694173740524359518651298947649492564", "264150447084997682606836082644682092084", "287753503035729093958269293000545068148", "307523271645099140668153680662108969524", "220147456312676611869346044083842734292", "327228937410587257821093229544540493170" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d07d1d40aabfd61bab21115639bd4f641db6002", "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c", "function": "mlx5_fw_reset_complete_reload" }, "id": "CVE-2024-42268-827622e9", "digest": { "length": 505.0, "function_hash": "43408178605064275707021538277570418072" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d07d1d40aabfd61bab21115639bd4f641db6002", "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c", "function": "mlx5_fw_reset_complete_reload" }, "id": "CVE-2024-42268-c993fdb4", "digest": { "length": 534.0, "function_hash": "57857531034205160444032347229866246498" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@572f9caa9e7295f8c8822e4122c7ae8f1c412ff9", "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "drivers/net/ethernet/mellanox/mlx5/core/fw_reset.c" }, "id": "CVE-2024-42268-e5102d58", "digest": { "threshold": 0.9, "line_hashes": [ "168717814970989042424667023801057682165", "137049616593910190076951174040003836201", "15340648569882155234970266493050235575", "204921897991262158371862972285466219527", "151694173740524359518651298947649492564", "264150447084997682606836082644682092084", "287753503035729093958269293000545068148", "307523271645099140668153680662108969524", "220147456312676611869346044083842734292", "327228937410587257821093229544540493170" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5", "signature_version": "v1" } ] }