CVE-2024-57807

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

History

16 Jan 2025, 15:19

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554 - () https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554 - Patch
References () https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8 - () https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8 - Patch
References () https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7 - () https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7 - Patch
References () https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b - () https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b - Patch
References () https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d - () https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d - Patch
References () https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815 - () https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815 - Patch
References () https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606 - () https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: megaraid_sas: Corrección de un posible bloqueo Esto corrige una advertencia de "posible dependencia de bloqueo circular detectada" CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Solucione esto liberando temporalmente el reset_mutex.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*

11 Jan 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-11 13:15

Updated : 2025-01-16 15:19


NVD link : CVE-2024-57807

Mitre link : CVE-2024-57807

CVE.ORG link : CVE-2024-57807


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking