From patchwork Tue Jul 9 18:44:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yuxuan Luo X-Patchwork-Id: 1958573 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4WJVJs2zcLz1ySg for ; Wed, 10 Jul 2024 04:44:28 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1sRFp1-0003Z4-KY; Tue, 09 Jul 2024 18:44:15 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1sRFoz-0003YK-2R for kernel-team@lists.ubuntu.com; Tue, 09 Jul 2024 18:44:13 +0000 Received: from mail-qv1-f70.google.com (mail-qv1-f70.google.com [209.85.219.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 718B53F6B5 for ; Tue, 9 Jul 2024 18:44:12 +0000 (UTC) Received: by mail-qv1-f70.google.com with SMTP id 6a1803df08f44-6b5f37aae55so55115846d6.0 for ; Tue, 09 Jul 2024 11:44:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1720550651; x=1721155451; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=C7MpjTK04dZs3jcNb+VRFHV70Qu5ULFMH392JzBB4RA=; b=pWq4j7W7H+dTKjXXyke3LZWF8lfOMHJ+4ksgzb1lwhUtGHp8aulsw+OI4RfZMFXuna bdZXUd1dLKsgxLkqtHcyAqxMyUjMt1YAREro+/mp9jcqBaIKBOS2x2ES421EaWyQgdSI Es1w+lyJvZ4f67UuVWhBrK2zfqjbbkOi1+DU9xsgGzKI/GpD/I8hAzycgQy7jq5RaaL9 FzttWXjP3kBvAXTGxCf7PpekAH4ZMbmIQoiEiWhBUwZu1SMmn65WxvvTBDrERw4k7NFg Q3E+zf/mOyTQvJ5kjT9Ub2aeTyUeyAyufI3p2dLfNePY89FKD77AbQ5FyhGBudsd/oCe k2wQ== X-Gm-Message-State: AOJu0YyDQaGWR4cK1etPLh7AkiMiA8YcKdc2ChMlgmJHbhs3CA1328Wa cEkMvA29hF0NBKsf6ExH5v32QfwBLzARJX9B6CSLw3gmWz+/twVBYPh9NRYV8JaVA/Nt3WDFOQt 0eeB3L7QTHsE/It5OhHYkCoEmLSnKN7ZPFnvOAtUDtrRFzmMf6X2pFCTLk+102UsX/TjZetwNjE nfCyW2uLzuDg== X-Received: by 2002:ad4:5c68:0:b0:6b5:d9ef:d576 with SMTP id 6a1803df08f44-6b61bc80440mr36446476d6.12.1720550650948; Tue, 09 Jul 2024 11:44:10 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH4SkHwvNtGNIGuFdUIdtno4GXWHtieFrD9HQGYs8OA7HpmCBYfTh1F81j6hAFF8Cp1iIu15g== X-Received: by 2002:ad4:5c68:0:b0:6b5:d9ef:d576 with SMTP id 6a1803df08f44-6b61bc80440mr36446286d6.12.1720550650564; Tue, 09 Jul 2024 11:44:10 -0700 (PDT) Received: from cache-ubuntu.hsd1.nj.comcast.net ([2001:67c:1562:8007::aac:4795]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-6b61ba8c9f1sm10960206d6.123.2024.07.09.11.44.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Jul 2024 11:44:10 -0700 (PDT) From: Yuxuan Luo To: kernel-team@lists.ubuntu.com Subject: [SRU][F][PATCH 0/1] CVE-2024-24860 Date: Tue, 9 Jul 2024 14:44:07 -0400 Message-Id: <20240709184408.2020719-1-yuxuan.luo@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] A race condition is found in net/bluetooth subsystem during a key setting session due to atomicity violation. This data race can lead to unexpected data inconsistency, harming user system's data integrity. [Backport] Although the break commit is not included in the tree, we believe that the race condition has long existed since the introduction of le_min_key_size_write() and le_max_key_size_write() which were later renamed to {min,max}_key_size_set(). Therefore, I manually applied the fix made for hci_debugfs.c to smp.c since 18f81241b74f ("Bluetooth: Move {min,max}_key_size debugfs into hci_debugfs_create_le") is yet to be introduced. [Test] Compiled only. [Where things could go wrong] Bluetooth system may produce unexpected behaviour when pairing if a regression occurs. Gui-Dong Han (1): Bluetooth: Fix atomicity violation in {min,max}_key_size_set net/bluetooth/smp.c | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) Acked-by: Manuel Diewald Acked-by: Chris Chiu