CVE-2024-42140

In the Linux kernel, the following vulnerability has been resolved: riscv: kexec: Avoid deadlock in kexec crash path If the kexec crash code is called in the interrupt context, the machine_kexec_mask_interrupts() function will trigger a deadlock while trying to acquire the irqdesc spinlock and then deactivate irqchip in irq_set_irqchip_state() function. Unlike arm64, riscv only requires irq_eoi handler to complete EOI and keeping irq_set_irqchip_state() will only leave this possible deadlock without any use. So we simply remove it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Aug 2024, 14:08

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 - () https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 - Mailing List, Patch
References () https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c - () https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c - Mailing List, Patch
References () https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 - () https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 - Mailing List, Patch
References () https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d - () https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d - Mailing List, Patch
References () https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 - () https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 - Mailing List, Patch

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: kexec: evitar interbloqueo en la ruta de bloqueo de kexec Si se llama al código de bloqueo de kexec en el contexto de interrupción, la función machine_kexec_mask_interrupts() activará un interbloqueo al intentar adquirir el spinlock irqdesc y luego desactive irqchip en la función irq_set_irqchip_state(). A diferencia de arm64, riscv solo requiere que el controlador irq_eoi complete la EOI y mantener irq_set_irqchip_state() solo dejará este posible punto muerto sin ningún uso. Así que simplemente lo eliminamos.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2024-08-23 14:08


NVD link : CVE-2024-42140

Mitre link : CVE-2024-42140

CVE.ORG link : CVE-2024-42140


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking