CVE-2024-26691

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix circular locking dependency The rule inside kvm enforces that the vcpu->mutex is taken *inside* kvm->lock. The rule is violated by the pkvm_create_hyp_vm() which acquires the kvm->lock while already holding the vcpu->mutex lock from kvm_vcpu_ioctl(). Avoid the circular locking dependency altogether by protecting the hyp vm handle with the config_lock, much like we already do for other forms of VM-scoped data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

History

27 Feb 2025, 14:34

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/10c02aad111df02088d1a81792a709f6a7eca6cc - () https://git.kernel.org/stable/c/10c02aad111df02088d1a81792a709f6a7eca6cc - Patch
References () https://git.kernel.org/stable/c/3ab1c40a1e915e350d9181a4603af393141970cc - () https://git.kernel.org/stable/c/3ab1c40a1e915e350d9181a4603af393141970cc - Patch
References () https://git.kernel.org/stable/c/3d16cebf01127f459dcfeb79ed77bd68b124c228 - () https://git.kernel.org/stable/c/3d16cebf01127f459dcfeb79ed77bd68b124c228 - Patch
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Information

Published : 2024-04-03 15:15

Updated : 2025-02-27 14:34


NVD link : CVE-2024-26691

Mitre link : CVE-2024-26691

CVE.ORG link : CVE-2024-26691


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking