CVE-2024-27030

In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Use separate handlers for interrupts For PF to AF interrupt vector and VF to AF vector same interrupt handler is registered which is causing race condition. When two interrupts are raised to two CPUs at same time then two cores serve same event corrupting the data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2024, 19:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - Patch
References () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - Patch
References () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - Patch
References () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - Patch
References () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - Patch
References () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - Patch
References () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - Patch
References () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel
CWE CWE-362
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 -
References () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 -
References () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c -
References () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a -
References () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 -
References () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 -
References () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c -
References () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: octeontx2-af: utilice controladores separados para las interrupciones. Para el vector de interrupción PF a AF y el vector VF a AF, se registra el mismo controlador de interrupciones, lo que provoca la condición de ejecución. Cuando se generan dos interrupciones en dos CPU al mismo tiempo, dos núcleos atienden el mismo evento y corrompen los datos.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 19:33


NVD link : CVE-2024-27030

Mitre link : CVE-2024-27030

CVE.ORG link : CVE-2024-27030


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')