In the Linux kernel, the following vulnerability has been resolved:
rtmutex: Drop rt_mutex::wait_lock before scheduling
rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the
good case it returns with the lock held and in the deadlock case it emits a
warning and goes into an endless scheduling loop with the lock held, which
triggers the 'scheduling in atomic' warning.
Unlock rt_mutex::wait_lock in the dead lock case before issuing the warning
and dropping into the schedule for ever loop.
[ tglx: Moved unlock before the WARN(), removed the pointless comment,
massaged changelog, added Fixes tag ]
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-27 13:15
Updated : 2024-10-02 14:27
NVD link : CVE-2024-46829
Mitre link : CVE-2024-46829
CVE.ORG link : CVE-2024-46829
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking