CVE-2024-26686

In the Linux kernel, the following vulnerability has been resolved: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats lock_task_sighand() can trigger a hard lockup. If NR_CPUS threads call do_task_stat() at the same time and the process has NR_THREADS, it will spin with irqs disabled O(NR_CPUS * NR_THREADS) time. Change do_task_stat() to use sig->stats_lock to gather the statistics outside of ->siglock protected section, in the likely case this code will run lockless.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

History

02 May 2025, 07:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0c35d1914353799c54fa1843fe7dea6fcbcdbac5 -
  • () https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164 -

17 Mar 2025, 15:40

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071 - () https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071 - Patch
References () https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6 - () https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6 - Patch
References () https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305 - () https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305 - Patch
References () https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d - () https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

09 Dec 2024, 13:10

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6 -

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071 - () https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071 -
References () https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305 - () https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305 -
References () https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d - () https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/proc: do_task_stat: use sig->stats_lock para recopilar las estadísticas de subprocesos/hijos lock_task_sighand() puede desencadenar un bloqueo completo. Si los subprocesos NR_CPUS llaman a do_task_stat() al mismo tiempo y el proceso tiene NR_THREADS, girará con irqs deshabilitados O(NR_CPUS * NR_THREADS) tiempo. Cambie do_task_stat() para usar sig->stats_lock para recopilar las estadísticas fuera de ->sección protegida siglock, en el caso probable de que este código se ejecute sin bloqueo.

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-05-02 07:15


NVD link : CVE-2024-26686

Mitre link : CVE-2024-26686

CVE.ORG link : CVE-2024-26686


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking