U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-40904 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages The syzbot fuzzer found that the interrupt-URB completion callback in the cdc-wdm driver was taking too long, and the driver's immediate resubmission of interrupt URBs with -EPROTO status combined with the dummy-hcd emulation to cause a CPU lockup: cdc_wdm 1-1:1.0: nonzero urb status received: -71 cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625] CPU#0 Utilization every 4s during lockup: #1: 98% system, 0% softirq, 3% hardirq, 0% idle #2: 98% system, 0% softirq, 3% hardirq, 0% idle #3: 98% system, 0% softirq, 3% hardirq, 0% idle #4: 98% system, 0% softirq, 3% hardirq, 0% idle #5: 98% system, 1% softirq, 3% hardirq, 0% idle Modules linked in: irq event stamp: 73096 hardirqs last enabled at (73095): [<ffff80008037bc00>] console_emit_next_record kernel/printk/printk.c:2935 [inline] hardirqs last enabled at (73095): [<ffff80008037bc00>] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994 hardirqs last disabled at (73096): [<ffff80008af10b00>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs last disabled at (73096): [<ffff80008af10b00>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs last enabled at (73048): [<ffff8000801ea530>] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (73048): [<ffff8000801ea530>] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582 softirqs last disabled at (73043): [<ffff800080020de8>] __do_softirq+0x14/0x20 kernel/softirq.c:588 CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Testing showed that the problem did not occur if the two error messages -- the first two lines above -- were removed; apparently adding material to the kernel log takes a surprisingly large amount of time. In any case, the best approach for preventing these lockups and to avoid spamming the log with thousands of error messages per second is to ratelimit the two dev_err() calls. Therefore we replace them with dev_err_ratelimited().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94 Patch 
https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94 Patch 
https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28 Patch 
https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28 Patch 
https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56 Patch 
https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56 Patch 
https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46 Patch 
https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46 Patch 
https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879 Patch 
https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879 Patch 
https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a Patch 
https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a Patch 
https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c Patch 
https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c Patch 
https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c Patch 
https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-40904
NVD Published Date:
07/12/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org