Skip to main content

CVE-2024-42274: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42274cvecve-2024-42274
Published: Sat Aug 17 2024 (08/17/2024, 08:54:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "ALSA: firewire-lib: operate for period elapse event in process context" Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") removed the process context workqueue from amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove its overhead. With RME Fireface 800, this lead to a regression since Kernels 5.14.0, causing an AB/BA deadlock competition for the substream lock with eventual system freeze under ALSA operation: thread 0: * (lock A) acquire substream lock by snd_pcm_stream_lock_irq() in snd_pcm_status64() * (lock B) wait for tasklet to finish by calling tasklet_unlock_spin_wait() in tasklet_disable_in_atomic() in ohci_flush_iso_completions() of ohci.c thread 1: * (lock B) enter tasklet * (lock A) attempt to acquire substream lock, waiting for it to be released: snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed() in update_pcm_pointers() in process_ctx_payloads() in process_rx_packets() of amdtp-stream.c ? tasklet_unlock_spin_wait </NMI> <TASK> ohci_flush_iso_completions firewire_ohci amdtp_domain_stream_pcm_pointer snd_firewire_lib snd_pcm_update_hw_ptr0 snd_pcm snd_pcm_status64 snd_pcm ? native_queued_spin_lock_slowpath </NMI> <IRQ> _raw_spin_lock_irqsave snd_pcm_period_elapsed snd_pcm process_rx_packets snd_firewire_lib irq_target_callback snd_firewire_lib handle_it_packet firewire_ohci context_tasklet firewire_ohci Restore the process context work queue to prevent deadlock AB/BA deadlock competition for ALSA substream lock of snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(). revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") Replace inline description to prevent future deadlock.

AI-Powered Analysis

AILast updated: 06/29/2025, 06:40:39 UTC

Technical Analysis

CVE-2024-42274 is a vulnerability in the Linux kernel related to the ALSA (Advanced Linux Sound Architecture) firewire-lib subsystem, specifically affecting the handling of period elapse events in process context. The issue originated from a commit (7ba5ca32fe6e) that removed the process context workqueue from the functions amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to reduce overhead. However, this change introduced a regression affecting systems using the RME Fireface 800 audio interface since Linux kernel version 5.14.0. The regression causes a classic AB/BA deadlock scenario involving competing locks on the ALSA substream lock. One thread acquires the substream lock and waits for a tasklet to finish, while another thread holds the tasklet and waits for the substream lock, resulting in a system freeze during ALSA operations. The deadlock occurs between snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(), with the tasklet operations occurring in the firewire OHCI driver. The fix involved reverting the problematic commit to restore the process context workqueue, preventing the deadlock by ensuring proper lock acquisition order and context. This vulnerability does not involve privilege escalation or direct code execution but causes a denial of service (system freeze) due to kernel deadlock during audio processing with specific hardware and kernel versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2024-42274 is a denial of service condition on Linux systems running kernel versions from 5.14.0 onward that utilize the ALSA firewire-lib subsystem with RME Fireface 800 or similar hardware. Organizations relying on Linux-based audio processing, multimedia production, or real-time audio streaming could experience system freezes, disrupting operations and potentially causing data loss or downtime. This is particularly relevant for industries such as broadcasting, music production, and any sector using professional audio equipment interfaced via FireWire on Linux. The deadlock-induced freeze affects system availability but does not directly compromise confidentiality or integrity. However, the disruption could have cascading effects on business continuity and service delivery. Since the vulnerability requires specific hardware and kernel versions, its impact is limited to environments with these configurations. European organizations with Linux deployments in audio-critical roles should assess their exposure and patch accordingly to maintain operational stability.

Mitigation Recommendations

To mitigate CVE-2024-42274, European organizations should: 1) Identify Linux systems running kernel versions 5.14.0 or later that use ALSA firewire-lib and specifically check for the presence of RME Fireface 800 or similar FireWire audio hardware. 2) Apply the patch that reverts commit 7ba5ca32fe6e to restore the process context workqueue, which is the official fix preventing the deadlock. If official kernel updates are not yet available, consider backporting the fix or temporarily reverting the problematic commit in custom kernel builds. 3) Where patching is delayed, limit usage of affected audio hardware or avoid workloads that trigger ALSA period elapse events to reduce the risk of deadlock. 4) Monitor system logs and kernel messages for signs of deadlock or freezes related to ALSA and FireWire operations. 5) Implement robust system monitoring and automated recovery mechanisms to detect and remediate system freezes promptly. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on hardware-specific and kernel-version-specific conditions and emphasizing proactive detection and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-30T07:40:12.260Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe1dc5

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 6:40:39 AM

Last updated: 7/29/2025, 5:13:14 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats