CVE-2024-35806

In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Always disable interrupts when taking cgr_lock smp_call_function_single disables IRQs when executing the callback. To prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere. This is already done by qman_update_cgr and qman_delete_cgr; fix the other lockers.
References
Link Resource
https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 Patch
https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f Patch
https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 Patch
https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a Patch
https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 Patch
https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd Patch
https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 Patch
https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec Patch
https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 Patch
https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 Patch
https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f Patch
https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 Patch
https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a Patch
https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 Patch
https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd Patch
https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 Patch
https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec Patch
https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

10 Jan 2025, 18:11

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Linux linux Kernel
Debian debian Linux
Debian
Linux
References () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 - () https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397 - Patch
References () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f - () https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f - Patch
References () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 - () https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3 - Patch
References () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a - () https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a - Patch
References () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 - () https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03 - Patch
References () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd - () https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd - Patch
References () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 - () https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9 - Patch
References () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec - () https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec - Patch
References () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 - () https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2024-05-17 14:15

Updated : 2025-01-10 18:11


NVD link : CVE-2024-35806

Mitre link : CVE-2024-35806

CVE.ORG link : CVE-2024-35806


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking