CVE-2024-43851

In the Linux kernel, the following vulnerability has been resolved: soc: xilinx: rename cpu_number1 to dummy_cpu_number The per cpu variable cpu_number1 is passed to xlnx_event_handler as argument "dev_id", but it is not used in this function. So drop the initialization of this variable and rename it to dummy_cpu_number. This patch is to fix the following call trace when the kernel option CONFIG_DEBUG_ATOMIC_SLEEP is enabled: BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0 preempt_count: 1, expected: 0 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53 Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT) Call trace: dump_backtrace+0xd0/0xe0 show_stack+0x18/0x40 dump_stack_lvl+0x7c/0xa0 dump_stack+0x18/0x34 __might_resched+0x10c/0x140 __might_sleep+0x4c/0xa0 __kmem_cache_alloc_node+0xf4/0x168 kmalloc_trace+0x28/0x38 __request_percpu_irq+0x74/0x138 xlnx_event_manager_probe+0xf8/0x298 platform_probe+0x68/0xd8
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Oct 2024, 16:07

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916 - () https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916 - Patch
References () https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46 - () https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46 - Patch
References () https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5 - () https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5 - Patch
References () https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df - () https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df - Patch

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: xilinx: cambiar el nombre de cpu_number1 a dummy_cpu_number La variable por CPU cpu_number1 se pasa a xlnx_event_handler como argumento "dev_id", pero no se utiliza en esta función. Así que elimine la inicialización de esta variable y cámbiele el nombre a dummy_cpu_number. Este parche es para corregir el siguiente seguimiento de llamadas cuando la opción del kernel CONFIG_DEBUG_ATOMIC_SLEEP está habilitada: ERROR: función de suspensión llamada desde un contexto no válido en include/linux/sched/mm.h:274 in_atomic(): 1, irqs_disabled(): 0, non_block : 0, pid: 1, nombre: swapper/0 preempt_count: 1, esperado: 0 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53 Nombre de hardware: Xilinx Versal vmk180 Placa de evaluación rev1.1 (QSPI ) (DT) Seguimiento de llamadas: dump_backtrace+0xd0/0xe0 show_stack+0x18/0x40 dump_stack_lvl+0x7c/0xa0 dump_stack+0x18/0x34 __might_resched+0x10c/0x140 __might_sleep+0x4c/0xa0 __kmem_cache_alloc_node+0xf4/ 0x168 kmalloc_trace+0x28/0x38 __request_percpu_irq+0x74 /0x138 xlnx_event_manager_probe+0xf8/0x298 plataforma_probe+0x68/0xd8

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2024-10-24 16:07


NVD link : CVE-2024-43851

Mitre link : CVE-2024-43851

CVE.ORG link : CVE-2024-43851


JSON object : View

Products Affected

linux

  • linux_kernel