CVE-2024-47710

In the Linux kernel, the following vulnerability has been resolved: sock_map: Add a cond_resched() in sock_hash_free() Several syzbot soft lockup reports all have in common sock_hash_free() If a map with a large number of buckets is destroyed, we need to yield the cpu when needed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/bc05f6855642cff3c0eeb63060b35d8c4f8a851d -

24 Oct 2024, 13:57

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sock_map: Agregar un cond_resched() en sock_hash_free() Varios informes de bloqueo suave de syzbot tienen en común sock_hash_free(). Si se destruye un mapa con una gran cantidad de depósitos, debemos ceder la CPU cuando sea necesario.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/04f62c012e0e4683e572b30baf6004ca0a3f6772 - () https://git.kernel.org/stable/c/04f62c012e0e4683e572b30baf6004ca0a3f6772 - Patch
References () https://git.kernel.org/stable/c/1a11a1a53255ddab8a903cdae01b9d3eb2c1a47b - () https://git.kernel.org/stable/c/1a11a1a53255ddab8a903cdae01b9d3eb2c1a47b - Patch
References () https://git.kernel.org/stable/c/80bd490ac0a3b662a489e17d8eedeb1e905a3d40 - () https://git.kernel.org/stable/c/80bd490ac0a3b662a489e17d8eedeb1e905a3d40 - Patch
References () https://git.kernel.org/stable/c/984648aac87a6a1c8fd61663bec3f7b61eafad5e - () https://git.kernel.org/stable/c/984648aac87a6a1c8fd61663bec3f7b61eafad5e - Patch
References () https://git.kernel.org/stable/c/ae8c1b3e7353ad240b829eabac7ba2584b2c6bdc - () https://git.kernel.org/stable/c/ae8c1b3e7353ad240b829eabac7ba2584b2c6bdc - Patch
References () https://git.kernel.org/stable/c/b1339be951ad31947ae19bc25cb08769bf255100 - () https://git.kernel.org/stable/c/b1339be951ad31947ae19bc25cb08769bf255100 - Patch
References () https://git.kernel.org/stable/c/cd10abf41bae55c9d2b93f34a516dbf52626bcb7 - () https://git.kernel.org/stable/c/cd10abf41bae55c9d2b93f34a516dbf52626bcb7 - Patch
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux

21 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 12:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47710

Mitre link : CVE-2024-47710

CVE.ORG link : CVE-2024-47710


JSON object : View

Products Affected

linux

  • linux_kernel