CVE-2024-27408

In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup The Linked list element and pointer are not stored in the same memory as the eDMA controller register. If the doorbell register is toggled before the full write of the linked list a race condition error will occur. In remote setup we can only use a readl to the memory to assure the full write has occurred.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

History

18 Sep 2025, 17:31

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba - () https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba - Patch
References () https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 - () https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 - Patch
References () https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a - () https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a - Patch

21 Nov 2024, 09:04

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba - () https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba -
References () https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 - () https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 -
References () https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a - () https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a -

17 May 2024, 18:35

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 12:15

Updated : 2025-09-18 17:31


NVD link : CVE-2024-27408

Mitre link : CVE-2024-27408

CVE.ORG link : CVE-2024-27408


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')