CVE-2024-38553

In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock issue found in sungem driver, please refer to the commit ac0a230f719b ("eth: sungem: remove .ndo_poll_controller to avoid deadlocks"). The root cause of the issue is that netpoll is in atomic context and disable_irq() is called by .ndo_poll_controller interface of sungem driver, however, disable_irq() might sleep. After analyzing the implementation of fec_poll_controller(), the fec driver should have the same issue. Due to the fec driver uses NAPI for TX completions, the .ndo_poll_controller is unnecessary to be implemented in the fec driver, so fec_poll_controller() can be safely removed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f - Patch () https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f - Patch
References () https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243 - Patch () https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243 - Patch
References () https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5 - Patch () https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5 - Patch
References () https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e - Patch () https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e - Patch

27 Aug 2024, 19:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-667
References () https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f - () https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f - Patch
References () https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243 - () https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243 - Patch
References () https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5 - () https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5 - Patch
References () https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e - () https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e - Patch

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fec: elimine .ndo_poll_controller para evitar interbloqueos. Se encontró un problema de interbloqueo en el controlador sungem; consulte el commit ac0a230f719b ("eth: sungem: elimine .ndo_poll_controller para evitar interbloqueos "). La causa principal del problema es que netpoll está en un contexto atómico y la interfaz .ndo_poll_controller del controlador sungem llama a enable_irq(); sin embargo, enable_irq() puede estar inactivo. Después de analizar la implementación de fec_poll_controller(), el controlador fec debería tener el mismo problema. Debido a que el controlador fec utiliza NAPI para las completaciones de TX, no es necesario implementar .ndo_poll_controller en el controlador fec, por lo que fec_poll_controller() se puede eliminar de forma segura.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38553

Mitre link : CVE-2024-38553

CVE.ORG link : CVE-2024-38553


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking