In the Linux kernel, the following vulnerability has been resolved:
igb: Do not bring the device up after non-fatal error
Commit 004d25060c78 ("igb: Fix igbdown hung on surprise removal") changed igbioerrordetected() to ignore non-fatal pcie errors in order to avoid hung task that can happen when igbdown() is called multiple times. This caused an issue when processing transient non-fatal errors. igbioresume(), which is called after igbioerrordetected(), assumes that device is brought down by igbioerror_detected() if the interface is up. This resulted in panic with stacktrace below.
[ T3256] igb 0000:09:00.0 haeth0: igb: haeth0 NIC Link is Down [ T292] pcieport 0000:00:1c.5: AER: Uncorrected (Non-Fatal) error received: 0000:09:00.0 [ T292] igb 0000:09:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal), type=Transaction Layer, (Requester ID) [ T292] igb 0000:09:00.0: device [8086:1537] error status/mask=00004000/00000000 [ T292] igb 0000:09:00.0: [14] CmpltTO [ 200.105524,009][ T292] igb 0000:09:00.0: AER: TLP Header: 00000000 00000000 00000000 00000000 [ T292] pcieport 0000:00:1c.5: AER: broadcast errordetected message [ T292] igb 0000:09:00.0: Non-correctable non-fatal error reported. [ T292] pcieport 0000:00:1c.5: AER: broadcast mmioenabled message [ T292] pcieport 0000:00:1c.5: AER: broadcast resume message [ T292] ------------[ cut here ]------------ [ T292] kernel BUG at net/core/dev.c:6539! [ T292] invalid opcode: 0000 [#1] PREEMPT SMP [ T292] RIP: 0010:napienable+0x37/0x40 [ T292] Call Trace: [ T292] <TASK> [ T292] ? die+0x33/0x90 [ T292] ? dotrap+0xdc/0x110 [ T292] ? napienable+0x37/0x40 [ T292] ? doerrortrap+0x70/0xb0 [ T292] ? napienable+0x37/0x40 [ T292] ? napienable+0x37/0x40 [ T292] ? excinvalidop+0x4e/0x70 [ T292] ? napienable+0x37/0x40 [ T292] ? asmexcinvalidop+0x16/0x20 [ T292] ? napienable+0x37/0x40 [ T292] igbup+0x41/0x150 [ T292] igbioresume+0x25/0x70 [ T292] reportresume+0x54/0x70 [ T292] ? reportfrozendetected+0x20/0x20 [ T292] pciwalkbus+0x6c/0x90 [ T292] ? aerprintportinfo+0xa0/0xa0 [ T292] pciedorecovery+0x22f/0x380 [ T292] aerprocesserrdevices+0x110/0x160 [ T292] aerisr+0x1c1/0x1e0 [ T292] ? disableirqnosync+0x10/0x10 [ T292] irqthreadfn+0x1a/0x60 [ T292] irqthread+0xe3/0x1a0 [ T292] ? irqsetaffinitynotifier+0x120/0x120 [ T292] ? irqaffinitynotify+0x100/0x100 [ T292] kthread+0xe2/0x110 [ T292] ? kthreadcompleteandexit+0x20/0x20 [ T292] retfromfork+0x2d/0x50 [ T292] ? kthreadcompleteandexit+0x20/0x20 [ T292] retfromforkasm+0x11/0x20 [ T292] </TASK>
To fix this issue igbioresume() checks if the interface is running and the device is not down this means igbioerror_detected() did not bring the device down and there is no need to bring it up.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50040.json",
"cna_assigner": "Linux"
}[
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-3416def4",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57c5053eaa5f9a8a99e34732e37a86615318e464",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-35b714da",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a94079e3841d00ea5abb05e3233d019a86745f6",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-3976c4a1",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57c5053eaa5f9a8a99e34732e37a86615318e464",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-3efbb744",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a39c8f5c8aae74c5ab2ba466791f59ffaab0178",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-4986d588",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c92cbd283ddcf55fd85a9a9b0ba13298213f3dd7",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-5aa9b278",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a94079e3841d00ea5abb05e3233d019a86745f6",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-692f32ee",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c92cbd283ddcf55fd85a9a9b0ba13298213f3dd7",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-8035c30f",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@330a699ecbfc9c26ec92c6310686da1230b4e7eb",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-9dcf598a",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d79af3af2f49c6aae9add3d492c04d60c1b85ce4",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-9ec9a7a1",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dca2ca65a8695d9593e2cf1b40848e073ad75413",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-a944baf6",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a39c8f5c8aae74c5ab2ba466791f59ffaab0178",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-b0fbb122",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d79af3af2f49c6aae9add3d492c04d60c1b85ce4",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-b3b4ffd3",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@500be93c5d53b7e2c5314292012185f0207bad0c",
"signature_version": "v1"
},
{
"target": {
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-c056f617",
"deprecated": false,
"digest": {
"line_hashes": [
"304551497198006176333788012991771707460",
"311365762525587293104242516041149505215",
"111682547118298939714220846039423044608",
"136667589699192029971330244833952732790"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@500be93c5d53b7e2c5314292012185f0207bad0c",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-c48bb3e0",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dca2ca65a8695d9593e2cf1b40848e073ad75413",
"signature_version": "v1"
},
{
"target": {
"function": "igb_io_resume",
"file": "drivers/net/ethernet/intel/igb/igb_main.c"
},
"id": "CVE-2024-50040-c8602a56",
"deprecated": false,
"digest": {
"length": 276.0,
"function_hash": "103221052861355812149073468267133870293"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@330a699ecbfc9c26ec92c6310686da1230b4e7eb",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50040.json"