跳转到帖子

Oracle Linux: CVE-2024-26742: ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2024-26742: ELSA-2024-12682: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
04/03/2024
Created
10/18/2024
Added
10/16/2024
Modified
01/23/2025

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix disable_managed_interrupts Correct blk-mq registration issue with module parameter disable_managed_interrupts enabled. When we turn off the default PCI_IRQ_AFFINITY flag, the driver needs to register with blk-mq using blk_mq_map_queues(). The driver is currently calling blk_mq_pci_map_queues() which results in a stack trace and possibly undefined behavior. Stack Trace: [7.860089] scsi host2: smartpqi [7.871934] WARNING: CPU: 0 PID: 238 at block/blk-mq-pci.c:52 blk_mq_pci_map_queues+0xca/0xd0 [7.889231] Modules linked in: sd_mod t10_pi sg uas smartpqi(+) crc32c_intel scsi_transport_sas usb_storage dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse [7.924755] CPU: 0 PID: 238 Comm: kworker/0:3 Not tainted 4.18.0-372.88.1.el8_6_smartpqi_test.x86_64 #1 [7.944336] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 03/08/2022 [7.963026] Workqueue: events work_for_cpu_fn [7.978275] RIP: 0010:blk_mq_pci_map_queues+0xca/0xd0 [7.978278] Code: 48 89 de 89 c7 e8 f6 0f 4f 00 3b 05 c4 b7 8e 01 72 e1 5b 31 c0 5d 41 5c 41 5d 41 5e 41 5f e9 7d df 73 00 31 c0 e9 76 df 73 00 <0f> 0b eb bc 90 90 0f 1f 44 00 00 41 57 49 89 ff 41 56 41 55 41 54 [7.978280] RSP: 0018:ffffa95fc3707d50 EFLAGS: 00010216 [7.978283] RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000010 [7.978284] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffff9190c32d4310 [7.978286] RBP: 0000000000000000 R08: ffffa95fc3707d38 R09: ffff91929b81ac00 [7.978287] R10: 0000000000000001 R11: ffffa95fc3707ac0 R12: 0000000000000000 [7.978288] R13: ffff9190c32d4000 R14: 00000000ffffffff R15: ffff9190c4c950a8 [7.978290] FS:0000000000000000(0000) GS:ffff9193efc00000(0000) knlGS:0000000000000000 [7.978292] CS:0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [8.172814] CR2: 000055d11166c000 CR3: 00000002dae10002 CR4: 00000000007706f0 [8.172816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [8.172817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [8.172818] PKRU: 55555554 [8.172819] Call Trace: [8.172823]blk_mq_alloc_tag_set+0x12e/0x310 [8.264339]scsi_add_host_with_dma.cold.9+0x30/0x245 [8.279302]pqi_ctrl_init+0xacf/0xc8e [smartpqi] [8.294085]? pqi_pci_probe+0x480/0x4c8 [smartpqi] [8.309015]pqi_pci_probe+0x480/0x4c8 [smartpqi] [8.323286]local_pci_probe+0x42/0x80 [8.337855]work_for_cpu_fn+0x16/0x20 [8.351193]process_one_work+0x1a7/0x360 [8.364462]? create_worker+0x1a0/0x1a0 [8.379252]worker_thread+0x1ce/0x390 [8.392623]? create_worker+0x1a0/0x1a0 [8.406295]kthread+0x10a/0x120 [8.418428]? set_kthread_struct+0x50/0x50 [8.431532]ret_from_fork+0x1f/0x40 [8.444137] ---[ end trace 1bf0173d39354506 ]---

Solution(s)

  • oracle-linux-upgrade-kernel-uek

References

  • https://attackerkb.com/topics/cve-2024-26742
  • CVE - 2024-26742
  • ELSA-2024-12682
  • 查看数 705
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…