CVE-2024-36919

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/05/2024
Last modified:
22/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload<br /> <br /> The session resources are used by FW and driver when session is offloaded,<br /> once session is uploaded these resources are not used. The lock is not<br /> required as these fields won&amp;#39;t be used any longer. The offload and upload<br /> calls are sequential, hence lock is not required.<br /> <br /> This will suppress following BUG_ON():<br /> <br /> [ 449.843143] ------------[ cut here ]------------<br /> [ 449.848302] kernel BUG at mm/vmalloc.c:2727!<br /> [ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI<br /> [ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1<br /> Rebooting.<br /> [ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016<br /> [ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]<br /> [ 449.882910] RIP: 0010:vunmap+0x2e/0x30<br /> [ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41<br /> [ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206<br /> [ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005<br /> [ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000<br /> [ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf<br /> [ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000<br /> [ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0<br /> [ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000<br /> [ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0<br /> [ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> [ 449.993028] Call Trace:<br /> [ 449.995756] __iommu_dma_free+0x96/0x100<br /> [ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]<br /> [ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]<br /> [ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]<br /> [ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]<br /> [ 450.023103] process_one_work+0x1e8/0x3c0<br /> [ 450.027581] worker_thread+0x50/0x3b0<br /> [ 450.031669] ? rescuer_thread+0x370/0x370<br /> [ 450.036143] kthread+0x149/0x170<br /> [ 450.039744] ? set_kthread_struct+0x40/0x40<br /> [ 450.044411] ret_from_fork+0x22/0x30<br /> [ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls<br /> [ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler<br /> [ 450.159753] ---[ end trace 712de2c57c64abc8 ]---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.1 (including) 4.19.314 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.276 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.217 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.159 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.31 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.10 (excluding)
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*