CVE-2024-42274: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Revert "ALSA: firewire-lib: operate for period elapse event in process context" Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") removed the process context workqueue from amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove its overhead. With RME Fireface 800, this lead to a regression since Kernels 5.14.0, causing an AB/BA deadlock competition for the substream lock with eventual system freeze under ALSA operation: thread 0: * (lock A) acquire substream lock by snd_pcm_stream_lock_irq() in snd_pcm_status64() * (lock B) wait for tasklet to finish by calling tasklet_unlock_spin_wait() in tasklet_disable_in_atomic() in ohci_flush_iso_completions() of ohci.c thread 1: * (lock B) enter tasklet * (lock A) attempt to acquire substream lock, waiting for it to be released: snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed() in update_pcm_pointers() in process_ctx_payloads() in process_rx_packets() of amdtp-stream.c ? tasklet_unlock_spin_wait </NMI> <TASK> ohci_flush_iso_completions firewire_ohci amdtp_domain_stream_pcm_pointer snd_firewire_lib snd_pcm_update_hw_ptr0 snd_pcm snd_pcm_status64 snd_pcm ? native_queued_spin_lock_slowpath </NMI> <IRQ> _raw_spin_lock_irqsave snd_pcm_period_elapsed snd_pcm process_rx_packets snd_firewire_lib irq_target_callback snd_firewire_lib handle_it_packet firewire_ohci context_tasklet firewire_ohci Restore the process context work queue to prevent deadlock AB/BA deadlock competition for ALSA substream lock of snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(). revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") Replace inline description to prevent future deadlock.
AI Analysis
Technical Summary
CVE-2024-42274 is a vulnerability in the Linux kernel related to the ALSA (Advanced Linux Sound Architecture) firewire-lib subsystem, specifically affecting the handling of period elapse events in process context. The issue originated from a commit (7ba5ca32fe6e) that removed the process context workqueue from the functions amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to reduce overhead. However, this change introduced a regression affecting systems using the RME Fireface 800 audio interface since Linux kernel version 5.14.0. The regression causes a classic AB/BA deadlock scenario involving competing locks on the ALSA substream lock. One thread acquires the substream lock and waits for a tasklet to finish, while another thread holds the tasklet and waits for the substream lock, resulting in a system freeze during ALSA operations. The deadlock occurs between snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(), with the tasklet operations occurring in the firewire OHCI driver. The fix involved reverting the problematic commit to restore the process context workqueue, preventing the deadlock by ensuring proper lock acquisition order and context. This vulnerability does not involve privilege escalation or direct code execution but causes a denial of service (system freeze) due to kernel deadlock during audio processing with specific hardware and kernel versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-42274 is a denial of service condition on Linux systems running kernel versions from 5.14.0 onward that utilize the ALSA firewire-lib subsystem with RME Fireface 800 or similar hardware. Organizations relying on Linux-based audio processing, multimedia production, or real-time audio streaming could experience system freezes, disrupting operations and potentially causing data loss or downtime. This is particularly relevant for industries such as broadcasting, music production, and any sector using professional audio equipment interfaced via FireWire on Linux. The deadlock-induced freeze affects system availability but does not directly compromise confidentiality or integrity. However, the disruption could have cascading effects on business continuity and service delivery. Since the vulnerability requires specific hardware and kernel versions, its impact is limited to environments with these configurations. European organizations with Linux deployments in audio-critical roles should assess their exposure and patch accordingly to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-42274, European organizations should: 1) Identify Linux systems running kernel versions 5.14.0 or later that use ALSA firewire-lib and specifically check for the presence of RME Fireface 800 or similar FireWire audio hardware. 2) Apply the patch that reverts commit 7ba5ca32fe6e to restore the process context workqueue, which is the official fix preventing the deadlock. If official kernel updates are not yet available, consider backporting the fix or temporarily reverting the problematic commit in custom kernel builds. 3) Where patching is delayed, limit usage of affected audio hardware or avoid workloads that trigger ALSA period elapse events to reduce the risk of deadlock. 4) Monitor system logs and kernel messages for signs of deadlock or freezes related to ALSA and FireWire operations. 5) Implement robust system monitoring and automated recovery mechanisms to detect and remediate system freezes promptly. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on hardware-specific and kernel-version-specific conditions and emphasizing proactive detection and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Austria, Switzerland
CVE-2024-42274: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Revert "ALSA: firewire-lib: operate for period elapse event in process context" Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") removed the process context workqueue from amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove its overhead. With RME Fireface 800, this lead to a regression since Kernels 5.14.0, causing an AB/BA deadlock competition for the substream lock with eventual system freeze under ALSA operation: thread 0: * (lock A) acquire substream lock by snd_pcm_stream_lock_irq() in snd_pcm_status64() * (lock B) wait for tasklet to finish by calling tasklet_unlock_spin_wait() in tasklet_disable_in_atomic() in ohci_flush_iso_completions() of ohci.c thread 1: * (lock B) enter tasklet * (lock A) attempt to acquire substream lock, waiting for it to be released: snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed() in update_pcm_pointers() in process_ctx_payloads() in process_rx_packets() of amdtp-stream.c ? tasklet_unlock_spin_wait </NMI> <TASK> ohci_flush_iso_completions firewire_ohci amdtp_domain_stream_pcm_pointer snd_firewire_lib snd_pcm_update_hw_ptr0 snd_pcm snd_pcm_status64 snd_pcm ? native_queued_spin_lock_slowpath </NMI> <IRQ> _raw_spin_lock_irqsave snd_pcm_period_elapsed snd_pcm process_rx_packets snd_firewire_lib irq_target_callback snd_firewire_lib handle_it_packet firewire_ohci context_tasklet firewire_ohci Restore the process context work queue to prevent deadlock AB/BA deadlock competition for ALSA substream lock of snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(). revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event in process context") Replace inline description to prevent future deadlock.
AI-Powered Analysis
Technical Analysis
CVE-2024-42274 is a vulnerability in the Linux kernel related to the ALSA (Advanced Linux Sound Architecture) firewire-lib subsystem, specifically affecting the handling of period elapse events in process context. The issue originated from a commit (7ba5ca32fe6e) that removed the process context workqueue from the functions amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to reduce overhead. However, this change introduced a regression affecting systems using the RME Fireface 800 audio interface since Linux kernel version 5.14.0. The regression causes a classic AB/BA deadlock scenario involving competing locks on the ALSA substream lock. One thread acquires the substream lock and waits for a tasklet to finish, while another thread holds the tasklet and waits for the substream lock, resulting in a system freeze during ALSA operations. The deadlock occurs between snd_pcm_stream_lock_irq() in snd_pcm_status64() and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed(), with the tasklet operations occurring in the firewire OHCI driver. The fix involved reverting the problematic commit to restore the process context workqueue, preventing the deadlock by ensuring proper lock acquisition order and context. This vulnerability does not involve privilege escalation or direct code execution but causes a denial of service (system freeze) due to kernel deadlock during audio processing with specific hardware and kernel versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-42274 is a denial of service condition on Linux systems running kernel versions from 5.14.0 onward that utilize the ALSA firewire-lib subsystem with RME Fireface 800 or similar hardware. Organizations relying on Linux-based audio processing, multimedia production, or real-time audio streaming could experience system freezes, disrupting operations and potentially causing data loss or downtime. This is particularly relevant for industries such as broadcasting, music production, and any sector using professional audio equipment interfaced via FireWire on Linux. The deadlock-induced freeze affects system availability but does not directly compromise confidentiality or integrity. However, the disruption could have cascading effects on business continuity and service delivery. Since the vulnerability requires specific hardware and kernel versions, its impact is limited to environments with these configurations. European organizations with Linux deployments in audio-critical roles should assess their exposure and patch accordingly to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-42274, European organizations should: 1) Identify Linux systems running kernel versions 5.14.0 or later that use ALSA firewire-lib and specifically check for the presence of RME Fireface 800 or similar FireWire audio hardware. 2) Apply the patch that reverts commit 7ba5ca32fe6e to restore the process context workqueue, which is the official fix preventing the deadlock. If official kernel updates are not yet available, consider backporting the fix or temporarily reverting the problematic commit in custom kernel builds. 3) Where patching is delayed, limit usage of affected audio hardware or avoid workloads that trigger ALSA period elapse events to reduce the risk of deadlock. 4) Monitor system logs and kernel messages for signs of deadlock or freezes related to ALSA and FireWire operations. 5) Implement robust system monitoring and automated recovery mechanisms to detect and remediate system freezes promptly. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on hardware-specific and kernel-version-specific conditions and emphasizing proactive detection and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-30T07:40:12.260Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe1dc5
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 6:40:39 AM
Last updated: 7/29/2025, 5:13:14 AM
Views: 8
Related Threats
CVE-2025-9000: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8993: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8992: Cross-Site Request Forgery in mtons mblog
MediumCVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.