CVE-2024-35806

In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Always disable interrupts when taking cgr_lock smp_call_function_single disables IRQs when executing the callback. To prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere. This is already done by qman_update_cgr and qman_delete_cgr; fix the other lockers.
References
Link Resource
https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 Patch
https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f Patch
https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 Patch
https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a Patch
https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 Patch
https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd Patch
https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 Patch
https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec Patch
https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 Patch
https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 Patch
https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f Patch
https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 Patch
https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a Patch
https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 Patch
https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd Patch
https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 Patch
https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec Patch
https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

10 Jan 2025, 18:11

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 - () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 - Patch
References () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f - () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f - Patch
References () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 - () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 - Patch
References () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a - () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a - Patch
References () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 - () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 - Patch
References () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd - () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd - Patch
References () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 - () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 - Patch
References () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec - () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec - Patch
References () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 - () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List

21 Nov 2024, 09:20

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 - () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 -
References () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f - () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f -
References () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 - () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 -
References () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a - () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a -
References () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 - () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 -
References () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd - () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd -
References () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 - () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 -
References () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec - () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec -
References () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 - () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: soc:fsl:qbman: Desactiva siempre las interrupciones al tomar cgr_lock smp_call_function_single desactiva las IRQ al ejecutar la devolución de llamada. Para evitar interbloqueos, debemos desactivar las IRQ cuando llevemos cgr_lock a otro lugar. Esto ya lo hacen qman_update_cgr y qman_delete_cgr; arreglar los otros casilleros.

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-01-10 18:11


NVD link : CVE-2024-35806

Mitre link : CVE-2024-35806

CVE.ORG link : CVE-2024-35806


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking