In the Linux kernel, the following vulnerability has been resolved:
riscv: kexec: Avoid deadlock in kexec crash path
If the kexec crash code is called in the interrupt context, the
machine_kexec_mask_interrupts() function will trigger a deadlock while
trying to acquire the irqdesc spinlock and then deactivate irqchip in
irq_set_irqchip_state() function.
Unlike arm64, riscv only requires irq_eoi handler to complete EOI and
keeping irq_set_irqchip_state() will only leave this possible deadlock
without any use. So we simply remove it.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 | Mailing List Patch |
https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c | Mailing List Patch |
https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 | Mailing List Patch |
https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d | Mailing List Patch |
https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 | Mailing List Patch |
https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 | Mailing List Patch |
https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c | Mailing List Patch |
https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 | Mailing List Patch |
https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d | Mailing List Patch |
https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 - Mailing List, Patch |
23 Aug 2024, 14:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4 - Mailing List, Patch |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-30 08:15
Updated : 2024-11-21 09:33
NVD link : CVE-2024-42140
Mitre link : CVE-2024-42140
CVE.ORG link : CVE-2024-42140
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking