In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Use separate handlers for interrupts
For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2024, 19:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - Patch | |
References | () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - Patch | |
References | () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - Patch | |
References | () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - Patch | |
References | () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - Patch | |
References | () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - Patch | |
References | () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - Patch | |
References | () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
First Time |
Debian debian Linux
Debian Linux Linux linux Kernel |
|
CWE | CWE-362 | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - | |
References | () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - | |
References | () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - | |
References | () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - | |
References | () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - | |
References | () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - | |
References | () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - | |
References | () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2024-12-23 19:33
NVD link : CVE-2024-27030
Mitre link : CVE-2024-27030
CVE.ORG link : CVE-2024-27030
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')