CVE-2024-27030

In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Use separate handlers for interrupts For PF to AF interrupt vector and VF to AF vector same interrupt handler is registered which is causing race condition. When two interrupts are raised to two CPUs at same time then two cores serve same event corrupting the data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2024, 19:33

Type Values Removed Values Added
CWE CWE-362
References () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - Patch
References () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - Patch
References () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - Patch
References () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - Patch
References () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - Patch
References () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - Patch
References () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - Patch
References () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 19:33


NVD link : CVE-2024-27030

Mitre link : CVE-2024-27030

CVE.ORG link : CVE-2024-27030


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')