In the Linux kernel, the following vulnerability has been resolved:
md/dm-raid: don't call md_reap_sync_thread() directly
Currently md_reap_sync_thread() is called from raid_message() directly
without holding 'reconfig_mutex', this is definitely unsafe because
md_reap_sync_thread() can change many fields that is protected by
'reconfig_mutex'.
However, hold 'reconfig_mutex' here is still problematic because this
will cause deadlock, for example, commit 130443d60b1b ("md: refactor
idle/frozen_sync_thread() to fix deadlock").
Fix this problem by using stop_sync_thread() to unregister sync_thread,
like md/raid did.
References
Configurations
Configuration 1 (hide)
|
History
19 Sep 2025, 16:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/347dcdc15a1706f61aa545ae498ededdf31aeebc - Patch | |
References | () https://git.kernel.org/stable/c/9e59b8d76ff511505eb0dd1478329f09e0f04669 - Patch | |
References | () https://git.kernel.org/stable/c/cd32b27a66db8776d8b8e82ec7d7dde97a8693b0 - Patch |
21 Nov 2024, 09:20
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/347dcdc15a1706f61aa545ae498ededdf31aeebc - | |
References | () https://git.kernel.org/stable/c/9e59b8d76ff511505eb0dd1478329f09e0f04669 - | |
References | () https://git.kernel.org/stable/c/cd32b27a66db8776d8b8e82ec7d7dde97a8693b0 - |
17 May 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 14:15
Updated : 2025-09-19 16:02
NVD link : CVE-2024-35808
Mitre link : CVE-2024-35808
CVE.ORG link : CVE-2024-35808
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking