CVE-2024-38591

In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix deadlock on SRQ async events. xa_lock for SRQ table may be required in AEQ. Use xa_store_irq()/ xa_erase_irq() to avoid deadlock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868 - Patch () https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868 - Patch
References () https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d - Patch () https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d - Patch
References () https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9 - Patch () https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9 - Patch
References () https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0 - Patch () https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0 - Patch
References () https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37 - Patch () https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37 - Patch
References () https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c - Patch () https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c - Patch

27 Aug 2024, 18:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868 - () https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868 - Patch
References () https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d - () https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d - Patch
References () https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9 - () https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9 - Patch
References () https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0 - () https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0 - Patch
References () https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37 - () https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37 - Patch
References () https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c - () https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: RDMA/hns: corrige el punto muerto en eventos asíncronos de SRQ. Es posible que se requiera xa_lock para la tabla SRQ en AEQ. Utilice xa_store_irq()/ xa_erase_irq() para evitar un punto muerto.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38591

Mitre link : CVE-2024-38591

CVE.ORG link : CVE-2024-38591


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking