In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Use separate handlers for interrupts
For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2024, 19:33
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - Patch | |
References | () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - Patch | |
References | () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - Patch | |
References | () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - Patch | |
References | () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - Patch | |
References | () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - Patch | |
References | () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - Patch | |
References | () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
First Time |
Linux linux Kernel
Linux Debian debian Linux Debian |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 - | |
References | () https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 - | |
References | () https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c - | |
References | () https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a - | |
References | () https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 - | |
References | () https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 - | |
References | () https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c - | |
References | () https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2024-12-23 19:33
NVD link : CVE-2024-27030
Mitre link : CVE-2024-27030
CVE.ORG link : CVE-2024-27030
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')